nol_tech Profile Banner
nol Profile
nol

@nol_tech

Followers
759
Following
4K
Media
161
Statuses
1K

Infosec

🟨⬜️🟪⬛️
Joined September 2020
Don't wanna be here? Send us removal request.
@nol_tech
nol
3 years
Just popped on @msftsecresponse Q4 Security Researcher Leaderboard!
@nol_tech
nol
3 years
🥳🥳🥳
2
0
24
@nol_tech
nol
5 days
The automated coding setup I'm currently trying out is a phone with Google's android, connecting to a dev VM using Google's remote desktop services, and coding through Google's Antigravity IDE which uses Google's gemini-3-pro LLM I guess Google just owns me now
0
0
0
@sysxplore
sysxplore
7 days
If you're wondering how I get those colorized ping outputs. I use grc (Generic Colourizer). It works with so many tools straight out of the box (df, lsblk, free, ps and more). You can quickly install it with your package manager, for example: $ sudo dnf install grc Add these
@sysxplore
sysxplore
8 days
Did you know you can actually drop zeros in an IP address and it still works. For example: 10.20.0.2 → 10.20.2 10.0.0.68 → 10.68 Both reach the same host. It’s one of those neat little IP quirks I use in labs , saves me a few keystrokes every time 😅
16
157
2K
@sargampoudel
srgm
8 days
nextjs almost became ssh alternative
@rauchg
Guillermo Rauch
8 days
18
117
2K
@__morse
Tommy D. Rossi
11 days
tuistory: the playwright for terminal user interfaces
5
3
24
@hkashfi
Hamid Kashfi
15 days
Let me introduce you to my most novel and oldest technique to verify if sites behind CDN are hosted in Inside Iran or not. Works most of the time. I call it the BOOBS CHECK. curl -i https://domain/boobs.jpg If your response is a 403 with 10.10.34.x IP in body, you're landing
11
94
638
@__suto
Toan Pham
1 month
Look at recents fixed v8 found by BigSleep I guess AI was plugged into the v8 sandbox fuzzer, very powerful bug that used in recent v8ctf entries! https://t.co/hLWKseWNPZ https://t.co/qkt4Tz4R5A
1
3
57
@qriousec
Qrious Secure
2 months
Our fuzzer generated entirely by Vibing just found it first ( confirmed! ) 0day in Firefox. CVE and details soon!
10
86
708
@EmmanuelMacron
Emmanuel Macron
1 month
Soulagement immense ! Cécile Kohler et Jacques Paris, détenus depuis trois ans en Iran, sont sortis de la prison d'Evin et sont en route pour l’Ambassade de France à Téhéran. Je me félicite de cette première étape. Le dialogue se poursuit
926
2K
6K
@LexfoSecurite
Lexfo
2 months
🔔 New research from Lexfo on pre- & post-authentication vulnerabilities in WSO2 products — uncovering bypasses, RCE, SSRF, CSRF, and account-takeover risks. See our detail article → https://t.co/1jNmsIhdZl #cybersecurity #infosec #offensivesecurity #pentest #WSO2
blog.lexfo.fr
Uncovering bypasses, RCE, SSRF, CSRF, and account-takeover vulnerabilities in WSO2 products.
0
15
60
@nol_tech
nol
2 months
We just published the WSO2 research I led over last year!
@LexfoSecurite
Lexfo
2 months
🔔 New research from Lexfo on pre- & post-authentication vulnerabilities in WSO2 products — uncovering bypasses, RCE, SSRF, CSRF, and account-takeover risks. See our detail article → https://t.co/1jNmsIhdZl #cybersecurity #infosec #offensivesecurity #pentest #WSO2
0
1
8
@udunadan
dunadan
2 months
My expanded take on how to get started in vulnerability research https://t.co/XBLfj1vuwG
Tweet card summary image
github.com
Contribute to udunadan/notes development by creating an account on GitHub.
2
66
336
@nol_tech
nol
3 months
@cursor_ai Using the semantic search tool directly is much faster than using a regular prompt to make the LLM call it for you
0
0
0
@nol_tech
nol
3 months
@cursor_ai Suprisingly, it seems the Claude Opus model can be used with the cli agent without enabling "MAX" mode anywhere, when it is required when using the base Cursor IDE
1
0
1
@nol_tech
nol
3 months
@cursor_ai Some of the uncovered commands:
1
0
1
@nol_tech
nol
3 months
The new @cursor_ai CLI agent has a few hidden functions, which can enabled by editing the node.js source code, among them there is the semantic search tool, which I find quite nice for exploring a big, unfamiliar codebase.
1
0
2
@ambionics
Ambionics Security
5 months
🚀 Huge thanks to @cfreal_ for the threading PR. Lightyear is now faster than ever! We truly appreciate continued contributions. If you haven’t yet, give lightyear a try and see the difference yourself! #opensource #lightyear #performance #php #pentest #infosec #cybersecurity
@cfreal_
Charles Fol
6 months
lightyear just got 6 times faster! Although I now work at @Synacktiv, I proposed a PR for the tool to support threading and compression, greatly reducing the time required to dump a file. Dumping the demo /etc/passwd now takes 48s instead of 5m30. https://t.co/d7n4baN12a
0
2
10
@k_firsov
Kirill Firsov
6 months
My research on CVE-2025-49113 is out. https://t.co/kuLczCSv6V. Happy reading! #CVE #roundcube #poc @FearsOff
7
98
337
@_WEEXIAO
Kasey Zhang
7 months
Don't use structured output mode for reasoning tasks. We’re open sourcing Osmosis-Structure-0.6B: an extremely small model that can turn any unstructured data into any format (e.g. JSON schema). Use it with any model - download and blog below!
92
199
2K
@nol_tech
nol
7 months
instructions uncleared just rooted my friends
@rez0__
Joseph Thacker
7 months
root. for. your. friends. 🤼 it's more than a phrase, it's a deeply held belief. it's way of living, really. if you want to reject jealousy and thrive in your work and relationships, check out my latest blog post.
0
0
1
@Chocapikk_
Chocapikk 🤘🏻
7 months
🚨 New unauthenticated #RCE module for vBulletin 5.1.0-6.0.3 landed in Metasploit! No CVE assigned, but credit to Egidio Romano (EgiX) for the original write-up: https://t.co/qxmvpU6l43 🔗 PR: https://t.co/j1G7wp2L9Z
1
76
288