realraminfp Profile Banner
Ramin Farajpour Cami Profile
Ramin Farajpour Cami

@realraminfp

Followers
1K
Following
8K
Media
50
Statuses
577

Software | Security | Blockchain (Web3 - Solana) Engineer Power is always dangerous. It attracts the worst and corrupts the best. - Ragnar

FilterNetLand
Joined January 2021
Don't wanna be here? Send us removal request.
@realraminfp
Ramin Farajpour Cami
1 year
I was testing an IoT device that had unusual HTTP request structures, making it incompatible with browsers or standard request sending tools. The sequence involved: 1- TCP SYN packet 2- HTTP GET request, 3-TCP ACK packet, 4- and then receiving the HTTP response 1/2 @s__zoka
2
1
17
@realraminfp
Ramin Farajpour Cami
2 days
resulting in unauthorized cryptocurrency mining software installation. 2/2 Virustotal : https://t.co/7K4DGBPZCn #React2Shell #BugBounty #vulnerability
0
0
0
@realraminfp
Ramin Farajpour Cami
2 days
React2Shell (CVE-2025-55182): Real-World Incident Response to XMRig Cryptominer Attack On December 6, 2025, our production server experienced a security breach through exploitation of the React2Shell vulnerability Blog: https://t.co/9mpCSkCDOr 1/2
Tweet card summary image
raminfp.info
Complete incident response writeup of a React2Shell (CVE-2025-55182) vulnerability exploitation leading to XMRig cryptominer installation. Learn detection, analysis, remediation, and prevention...
1
1
4
@guanlandai
Guanlan Dai
19 days
今天不少朋友来 ping 我,说 Cloudflare 挂了。作为 Cloudflare FL 第一代的核心开发者我也分享下我的一些想法。 这次不是攻击,而是典型的“隐性假设 + 配置链条”的连环触发 —— 权限变更让底层表暴露出来,生成的 feature file 行数翻倍,超过了 FL2 的内存预设,最终把核心代理直接推向 panic。
24
80
728
@qriousec
Qrious Secure
2 months
Our fuzzer generated entirely by Vibing just found it first ( confirmed! ) 0day in Firefox. CVE and details soon!
10
85
708
@BlockSecTeam
BlockSec
1 month
14
117
531
@realraminfp
Ramin Farajpour Cami
1 month
Looks like this attack is pretty similar to the one explained by @BlockSecTeam in 2023. https://t.co/CEASg842Ue
Tweet card summary image
blocksecteam.medium.com
By BlockSec
@KaihuaQIN
Kaihua Qin
1 month
Not sure why many point to https://t.co/mj3PB4IsxU and call it an access-control bug. However, that TX looks like a legitimate withdrawal where the attacker simply pulled profits. The actual exploit appears to be https://t.co/8QaXfd5KWn. The root cause is convoluted, but at a
0
1
2
@mishajurin
Misha Jurin
1 month
Balancer just got exploited for $110M across multiple chains. Apparently, the attacker found a flaw in the vault's access control that allowed them to bypass authorization to withdraw internal user balances.
3
3
24
@realraminfp
Ramin Farajpour Cami
1 month
Axionsec – an agentic AI framework for cybersecurity! Autonomous AI agents powered by Rust + Google Gemini. Blog: https://t.co/TZLbErJ4H7 #AgenticAI #Cybersecurity #RustLang
1
0
7
@mikemaccana
Mike MacCana | Breakpoint 2025 🇦🇪
1 month
This LiteSVM video has been doing crazy numbers for the last 3 months and I’ve been keeping the repo up to date with the latest Anchor, so: https://t.co/ZvSf4BPjyT
6
9
33
@thezdi
Trend Zero Day Initiative
2 months
Wow - just wow. Ken Gannon (@yogehi) didn't just exploit the #Samsung Galaxy S25: he had it tell a joke, exfiltrate a picture, & open a shell. All that from a single click. He's off to the disclosure room with all the details. You can watch the attempt at
1
15
83
@exploitio
exploitio
2 months
✅ راه حل چالش #extract از @tryhackme ✔️ارسال درخواست Post در ssrf ✔️ارسال هدر و بدنه در درخواست ssrf ✔️آیا میدانید gopher چه کاربردی دارد؟ #tryhackme #tryhackmewriteup https://t.co/bAIpVmkU1X
@exploitio
exploitio
2 months
دیشب داشتم چالش #Extract رو از #tryhackme حل میکردم یه ssrf خیلی عالی بود! دوس دارین رایتاپ بزارم؟ #امنیت https://t.co/GifGPsP3pW
2
2
7
@realraminfp
Ramin Farajpour Cami
2 months
💯👌 eBPF/XDP are very fast and run inside the kernel, but DPDK is a level above in performance and direct control because it fully bypasses the kernel (true kernel bypass).
@dhruvsol
dhruvsol
2 months
eBPF and XDP are one thing, but DPDK is a whole different beast — proper kernel bypass is on another level.
0
1
10
@realraminfp
Ramin Farajpour Cami
2 months
فیکس جلوی فراخوانی تابع xPharProcessRewards توسط هر آدرسی را گرفت و تنها به قراردادهای تاییدشده اجازه داد.این عملاً مانع سوءاستفاده از اجرای خارجی (call(tradeData)) و انتقال درآمد/توکن‌ها به مهاجم شد. 3/3
0
0
2
@realraminfp
Ramin Farajpour Cami
2 months
هر آدرس خارجی عمومی می‌توانست این تابع را صدا بزند. مهاجم می‌توانست msg.sender خودش را جعل کند با ارسال tradeData مخرب، می‌توانست توکن‌ها را سرقت کند بعد از فیکس: حالا فقط کانترکت‌های تایید شده (approved contracts) می‌توانند این تابع را صدا بزنند. 2/3
1
0
2
@realraminfp
Ramin Farajpour Cami
2 months
این فیکس یک آسیب‌پذیری بسیار خطرناک را برطرف کرد. قبل از فیکس: تابع xPharProcessRewards() هیچ محدودیت دسترسی نداشت هیچ access control نبود و هر کسی می‌توانست آن را فراخوانی کند. این یعنی: 1/2
1
0
3
@realraminfp
Ramin Farajpour Cami
2 months
حالا جدا از این آسیب پذیری واجب شد نحوی سو استفاده از سرویس Redis رو توسط ردتیم ها انجام می شود در یک رایت اپ شرح بدهم. به زودی ....
@realraminfp
Ramin Farajpour Cami
2 months
A practical lab environment for testing and understanding the critical CVE-2025-49844 (RediShell) vulnerability in Redis. https://t.co/v9BxPgRymM Update to Redis 8.2.2+ immediately #RediShell #Security #RedTeam #PenTesting #SecurityResearch
0
2
60
@realraminfp
Ramin Farajpour Cami
2 months
A practical lab environment for testing and understanding the critical CVE-2025-49844 (RediShell) vulnerability in Redis. https://t.co/v9BxPgRymM Update to Redis 8.2.2+ immediately #RediShell #Security #RedTeam #PenTesting #SecurityResearch
2
5
16
@solana
Solana
2 months
If you have used Solana, like this post if you enjoy using Solana, RT this post (collecting data for analysis) 🔥
2K
7K
19K
@AlexMasonCrypto
Alex Mason 👁△
3 months
Iranians can mine one Bitcoin for $1.3k and sell it for $108k (~83x).
206
488
4K