pwntester Profile Banner
Alvaro Muñoz Profile
Alvaro Muñoz

@pwntester

Followers
13K
Following
633
Media
219
Statuses
5K

Security Researcher with @XBOW. CTF #int3pids. Opinions here are mine! bluesky: https://t.co/9HRRzpBECt

Madrid 🇪🇸
Joined December 2008
Don't wanna be here? Send us removal request.
@niemand_sec
Niemand
25 days
This is not our talk, DEFCON screens didn't work during our time slot. We recorded and uploaded the full talk ourselves. Our talk:
@AISecHub
AISecHub
25 days
Prompt Scan Exploit AI’s Journey Through 0Days and 1000 Bugs - https://t.co/JUncypFqAp at @defcon D. Jurado & J. Nogue Hi, it’s me, XBOW, the AI offensive agent—a smart cyber detective on a mission to find bugs in the digital world. In the past few months, I've discovered over
1
4
21
@Xbow
XBOW
24 days
Security tools catch issues. But do they matter? Join @GeekMasher + @pwntester with @GitHub tomorrow as they show how AI agents:  → Exploit like experts → Ship findings in minutes → Validate vulns scanners miss 🗓️Live @ 11:15am PT | 2:15pm ET https://t.co/u9l03t749R
0
4
17
@chudyPB
Piotr Bazydło
1 month
Fun times with Telerik UI and DoS by default (it will hit for a long time I think). Sometimes it may lead to more fun, like RCE :) Gadgeting inspired by @pwntester, Oleksandr and @steventseeley
@watchtowrcyber
watchTowr
1 month
Today, we publish our analysis of CVE-2025-3600 that we discovered in Telerik UI, a prolific library used in hundreds of thousands of applications. Tagged as a Denial of Service vulnerability, today we go deeper and demonstrate RCE scenarios.. https://t.co/RzHmW1Mrgu
2
8
53
@djurado9
djurado
2 months
Do not miss this live session from my teammates @moyix and @pwntester. Today, 10 am PT/ 1pm ET. You will learn about: - AI agents validating real vulnerabilities at scale - How can AI agents autonomously uncover and validate exploits using runtime behaviors - Techniques for
@Xbow
XBOW
2 months
200+ real vulns. 0 false positives. XBOW agents ran autonomous exploits across Docker Hub webapps, and uncovered vulnerabilities traditional tools miss. Systematic. Validated. No assumptions. 🗓️ This Thurs — @moyix + @pwntester lead a live breakdown https://t.co/Wztoo32YGs
0
2
13
@pwntester
Alvaro Muñoz
2 months
When I read the trace for this bug it reminded me of the almost identical finding by @artsploit in Datahub
Tweet card summary image
github.blog
The GitHub Security Lab audited DataHub, an open source metadata platform, and discovered several vulnerabilities in the platform's authentication and authorization modules. These vulnerabilities...
@Xbow
XBOW
2 months
XBOW found a new zero-day in Apache Druid. It wasn't just a lucky guess. XBOW is trained to think like a human attacker, using historical CVE knowledge to find a novel SSRF (CVE-2025-27888). This is how AI-powered pentesting turns old knowledge into new findings. Read the
0
2
24
@pwntester
Alvaro Muñoz
2 months
Join @moyix and yours truly in a fireside chat about all things @Xbow and our validators. If you haven’t registered yet, secure your seat here: https://t.co/InSQS9fITz More info at:
Tweet card summary image
linkedin.com
200 real vulns. 0 false positives. All exploited. This Thursday, join Brendan Dolan-Gavitt and Alvaro Muñoz to see how XBOW ran autonomous AI agents across Docker Hub apps to uncover 200+ validated...
0
2
12
@Xbow
XBOW
2 months
200+ real vulns. 0 false positives. XBOW agents ran autonomous exploits across Docker Hub webapps, and uncovered vulnerabilities traditional tools miss. Systematic. Validated. No assumptions. 🗓️ This Thurs — @moyix + @pwntester lead a live breakdown https://t.co/Wztoo32YGs
2
5
43
@adnanthekhan
Adnan Khan
3 months
GitHub even offers a built in suite of CodeQL detections for Actions that @pwntester wrote that easily catch things like those. Yet we still see the most obvious misconfigurations with critical impact. Vibe coding actions will get you wrecked.
1
1
16
@adnanthekhan
Adnan Khan
3 months
What a PR https://t.co/zdMt9Ilq4r by @NxDevTools This one was written by AI and introduces a critical PR title injection that could allow anyone to steal their NPM token with a little privesc. How is stuff like this still shipping?
Tweet card summary image
github.com
Current Behavior Currently, there is no automated check to ensure that PR titles follow our conventional commit format. This can lead to inconsistent PR titles that don't match our commit c...
6
8
86
@daryl_imagineai
Daryl
3 months
@moyix Dutch saying: Tall trees catch a lot of wind. Congrats, xbow is a tall tree :)
0
1
3
@pwntester
Alvaro Muñoz
3 months
Back at summer hacker camp, it’s been a while! Will be at @Xbow booth (3257) all morning. Come say hi!
0
0
10
@Xbow
XBOW
3 months
🚀 Excited to announce our partnership with @TrustVanta ! With XBOW’s autonomous penetration testing now in Vanta, startups can meet the highest security standards with speed and confidence—finding and validating real vulnerabilities in hours, not weeks. Learn more:
0
2
29
@djurado9
djurado
3 months
The new episode of @ctbbpodcast is out! Huge thanks to @Rhynorater and @rez0__ for having me. I had a great time chatting with you about XBOW and HackerOne’s Ambassador World Cup. It was a blast! 🫶🏼
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
3 months
New episode is out! — https://t.co/hX8NbjfgXO Releasing the episode on Monday so you have something to listen to during your travel to DEFCON =) Diego Djurado joins us to discuss XBOW's architecture, hunting approach, hallucination challenges, and AI's future in bug bounty. He
2
7
54
@nicowaisman
Nico Waisman
3 months
If you have some time today, check out @moyix highlights or @pwntester full blogpot on this amazing vulnerability and how it was exploited by XBOW. See you all in BH/Defcon next week!
@moyix
Brendan Dolan-Gavitt
4 months
YES! THIS one is my favorite :D Some details in thread below...
0
4
11
@oegerikus
Oege de Moor
4 months
Ingenious. A gripping detective story, with the plot devised by @XBOW, and told by @pwntester.
@Xbow
XBOW
4 months
XBOW pulled off the perfect digital heist: stealing files by hiding them in plain sight. Disguised arbitrary file content as satellite imagery pixels. TiTiler processed the "images" while XBOW extracted secrets from the compression data. Mission details:
0
1
8
@moyix
Brendan Dolan-Gavitt
4 months
YES! THIS one is my favorite :D Some details in thread below...
@Xbow
XBOW
4 months
XBOW pulled off the perfect digital heist: stealing files by hiding them in plain sight. Disguised arbitrary file content as satellite imagery pixels. TiTiler processed the "images" while XBOW extracted secrets from the compression data. Mission details:
2
4
32
@pwntester
Alvaro Muñoz
4 months
I was going to write a thread about my latest @Xbow blog post but @moyix wrote a perfect one. Go check it out!
Tweet card summary image
xbow.com
A complete arbitrary local file read vulnerability achieved through an ingenious byte-by-byte exfiltration technique.
@moyix
Brendan Dolan-Gavitt
4 months
YES! THIS one is my favorite :D Some details in thread below...
0
3
17
@Xbow
XBOW
4 months
Proud to have @djurado9 and @niemand_sec representing XBOW at @defcon Bug Bounty Village 🎯 XBOW finds vulns, our team shares the insights. See you in Vegas! #DEFCON
@BugBountyDEFCON
Bug Bounty Village
4 months
Don't miss "Prompt. Scan. Exploit: AI’s Journey Through Zero-Days and a Thousand Bugs" by Diego Jurado (djurado9) and Joel Noguera (@niemand_sec) on Friday, August 8 at 10:00 AM on Creator Stage 3. Read more at https://t.co/e3glU8gWAU #BugBounty #DEFCON33
0
3
20
@pwntester
Alvaro Muñoz
4 months
Wrote a blog post about @Xbow finding an arbitrary file read in Ninja tables 🥷, a popular WordPress plugin. Stay tuned for the following ones if you want to see XBOW exploiting a really cool file read and RCE
@Xbow
XBOW
4 months
When simple attack vectors fail, XBOW doesn't give up. ⚡️New discovery: Arbitrary file read in WordPress Ninja Tables plugin. Hidden in plain JavaScript sight, protected by nonce validation, but XBOW pieced together the exact request format needed. Technical breakdown here:
1
8
57
@Xbow
XBOW
4 months
When simple attack vectors fail, XBOW doesn't give up. ⚡️New discovery: Arbitrary file read in WordPress Ninja Tables plugin. Hidden in plain JavaScript sight, protected by nonce validation, but XBOW pieced together the exact request format needed. Technical breakdown here:
1
16
74