nol
@nol_tech
Followers
759
Following
4K
Media
161
Statuses
1K
The automated coding setup I'm currently trying out is a phone with Google's android, connecting to a dev VM using Google's remote desktop services, and coding through Google's Antigravity IDE which uses Google's gemini-3-pro LLM I guess Google just owns me now
0
0
0
If you're wondering how I get those colorized ping outputs. I use grc (Generic Colourizer). It works with so many tools straight out of the box (df, lsblk, free, ps and more). You can quickly install it with your package manager, for example: $ sudo dnf install grc Add these
Did you know you can actually drop zeros in an IP address and it still works. For example: 10.20.0.2 → 10.20.2 10.0.0.68 → 10.68 Both reach the same host. It’s one of those neat little IP quirks I use in labs , saves me a few keystrokes every time 😅
16
157
2K
Let me introduce you to my most novel and oldest technique to verify if sites behind CDN are hosted in Inside Iran or not. Works most of the time. I call it the BOOBS CHECK. curl -i https://domain/boobs.jpg If your response is a 403 with 10.10.34.x IP in body, you're landing
11
94
638
Look at recents fixed v8 found by BigSleep I guess AI was plugged into the v8 sandbox fuzzer, very powerful bug that used in recent v8ctf entries! https://t.co/hLWKseWNPZ
https://t.co/qkt4Tz4R5A
1
3
57
Our fuzzer generated entirely by Vibing just found it first ( confirmed! ) 0day in Firefox. CVE and details soon!
10
86
708
Soulagement immense ! Cécile Kohler et Jacques Paris, détenus depuis trois ans en Iran, sont sortis de la prison d'Evin et sont en route pour l’Ambassade de France à Téhéran. Je me félicite de cette première étape. Le dialogue se poursuit
926
2K
6K
🔔 New research from Lexfo on pre- & post-authentication vulnerabilities in WSO2 products — uncovering bypasses, RCE, SSRF, CSRF, and account-takeover risks. See our detail article → https://t.co/1jNmsIhdZl
#cybersecurity #infosec #offensivesecurity #pentest #WSO2
blog.lexfo.fr
Uncovering bypasses, RCE, SSRF, CSRF, and account-takeover vulnerabilities in WSO2 products.
0
15
60
We just published the WSO2 research I led over last year!
🔔 New research from Lexfo on pre- & post-authentication vulnerabilities in WSO2 products — uncovering bypasses, RCE, SSRF, CSRF, and account-takeover risks. See our detail article → https://t.co/1jNmsIhdZl
#cybersecurity #infosec #offensivesecurity #pentest #WSO2
0
1
8
My expanded take on how to get started in vulnerability research https://t.co/XBLfj1vuwG
github.com
Contribute to udunadan/notes development by creating an account on GitHub.
2
66
336
@cursor_ai Using the semantic search tool directly is much faster than using a regular prompt to make the LLM call it for you
0
0
0
@cursor_ai Suprisingly, it seems the Claude Opus model can be used with the cli agent without enabling "MAX" mode anywhere, when it is required when using the base Cursor IDE
1
0
1
The new @cursor_ai CLI agent has a few hidden functions, which can enabled by editing the node.js source code, among them there is the semantic search tool, which I find quite nice for exploring a big, unfamiliar codebase.
1
0
2
🚀 Huge thanks to @cfreal_ for the threading PR. Lightyear is now faster than ever! We truly appreciate continued contributions. If you haven’t yet, give lightyear a try and see the difference yourself! #opensource #lightyear #performance #php #pentest #infosec #cybersecurity
lightyear just got 6 times faster! Although I now work at @Synacktiv, I proposed a PR for the tool to support threading and compression, greatly reducing the time required to dump a file. Dumping the demo /etc/passwd now takes 48s instead of 5m30. https://t.co/d7n4baN12a
0
2
10
My research on CVE-2025-49113 is out. https://t.co/kuLczCSv6V. Happy reading! #CVE #roundcube #poc @FearsOff
7
98
337
Don't use structured output mode for reasoning tasks. We’re open sourcing Osmosis-Structure-0.6B: an extremely small model that can turn any unstructured data into any format (e.g. JSON schema). Use it with any model - download and blog below!
92
199
2K
🚨 New unauthenticated #RCE module for vBulletin 5.1.0-6.0.3 landed in Metasploit! No CVE assigned, but credit to Egidio Romano (EgiX) for the original write-up: https://t.co/qxmvpU6l43 🔗 PR: https://t.co/j1G7wp2L9Z
1
76
288