securityshell Profile Banner
Marius Avram Profile
Marius Avram

@securityshell

Followers
16K
Following
12K
Media
623
Statuses
17K

Web Application Security Consultant. Two sons' proud dad!

Online
Joined May 2009
Don't wanna be here? Send us removal request.
@securityshell
Marius Avram
2 days
2026 just called, it wants its cyber apocalypse early 😂 https://t.co/qoxX0SVcH6
0
0
2
@Starlink
Starlink
22 days
With more than 8,500 satellites in orbit, Starlink provides connectivity through harsh weather conditions, network disruptions, and natural disasters. Order online in under 2 minutes.
757
2K
12K
@DefusedCyber
Defused
3 days
🚨 React has disclosed two new, additional vulnerabilities to the critical RCE vuln of last week - CVE-2025-55183 and CVE-2025-55184. Patches are available and urged to be applied immediately. Track live attacks against React honeypots 👉 https://t.co/GXFaqggV8a
0
19
80
@N3mes1s
Giuseppe `N3mes1s`
3 days
#Pruva reproduction and Detection/Scanner for the CVE-2024-55947 bypass CVE-2025-8110 , but as @wiz_io said, it could be that the artficats are gone or private. Gogs Path Traversal Vulnerability https://t.co/DpoWafsAcq
@TheHackersNews
The Hacker News
3 days
🚨 700+ Gogs servers hacked — no patch yet. New flaw (CVE-2025-8110) lets attackers overwrite files and run code through symbolic links, bypassing last year’s fix. Wiz found Supershell malware — often used by Chinese groups — on many hacked servers. 🔗 Read:
1
14
70
@securityshell
Marius Avram
4 days
Extending Burp Suite for fun and profit – The Montoya way – Part 9 - HN Security
hnsecurity.it
A comprehensive guide on extending Burp Scanner with custom scan checks.
0
1
0
@sasi2103
Sasi Levi 🎧
5 days
@NomaSecurity we just published a critical security vulnerability in Gemini Enterprise, and indirect prompt injection that exposed Google Docs, Calendar and Gmail. Thanks to @GoogleVRP for the collaboration. https://t.co/yEc63WHLmC
Tweet card summary image
noma.security
Noma Labs discovered a zero-click vulnerability, known as GeminiJack, using an indirect prompt injection inside Google Gemini Enterprise.
3
22
49
@securityshell
Marius Avram
5 days
Air-gapped cybersecurity assistant for security professionals. 100% offline AI-powered analysis tool for Nmap, Volatility, BloodHound, Metasploit, YARA, and more. Built for environments where cloud AI isn't available.
Tweet card summary image
gitlab.com
Air-gapped cybersecurity assistant for security professionals. 100% offline AI-powered analysis tool for Nmap, Volatility, BloodHound, Metasploit, YARA, and more. Built for environments where cloud...
0
0
0
@garethheyes
Gareth Heyes \u2028
5 days
Meet AutoVader. It automates DOM Invader with Playwright Java and feeds results back into Burp. Faster client side bug hunting for everyone. 🚀 https://t.co/ZWWX4y2IRC
Tweet card summary image
thespanner.co.uk
Four years ago we released DOM Invader, I added a feature called callbacks that enabled you to execute JavaScript and log when sinks, messages or sources are found. This was so powerful but over the...
1
4
30
@1ZRR4H
Germán Fernández
5 days
🔴 Watch out, someone is "patching" (?) servers vulnerable to #React2Shell and leaving a warning message about CVE-2025-55182 in English, Chinese, Japanese, and Spanish. According to Censys, 314 servers had/have this condition at this very moment. The vast majority of domains
1
69
463
@lukOlejnik
Lukasz Olejnik
6 days
Polish police detained three Ukrainians with professional hacking equipment: FLIPPER, spy detector, antennas, laptops, SIM cards. Charges include attempted damage to IT data critical for national security. Suspects couldn't explain equipment's purpose (when asked, they suddenly
45
64
535
@securityshell
Marius Avram
9 days
Holy shit… the exploitation of CVE-2025-55182 has reached a new level. There’s now a publicly available Chrome extension on GitHub that automatically scans for and exploits vulnerable sites as you browse. Absolutely wild. 🤦‍♂️
64
420
4K
@Inevitablewest
Inevitable West
9 days
🚨BREAKING: The EU has fined X €120m for refusing to engage with censorship This is a direct assault on free speech. The EU is the enemy of the people.
1K
5K
28K
@securityshell
Marius Avram
9 days
Somewhere right now, there are ten thousand laptops sounding like jet engines running the exact same CVE-2025-55182 POC. All sprinting to be the 9,999th duplicate so Hackerone/Bugcrowd can bless them with a kudos. Dream big, kings, history remembers the duplicates! 😂
0
0
4
@stephenfewer
Stephen Fewer
10 days
An unauthenticated RCE PoC for the React vuln (CVE-2025-55182) is now public. Confirmed to work on my test setup (Next.js 16.0.6 with React 19.2.0).
@maple3142
maple3142
10 days
A POC for CVE-2025-55182 https://t.co/BcyJ1UbivA
8
77
638
@albinowax
James Kettle
10 days
You can now scan for #react2shell in @Burp_Suite. To enable, install the Extensibility Helper bapp, go to the bambda tab and search for react2shell. Shout-out to @assetnote for sharing a reliable detection technique!
7
106
645
@stdoutput
Moritz Sanft
10 days
Since I started to analyze CVE-2025-55182 (React, NextJS RCE) at work today, I decided to publish my analysis findings so far, given all the fuzz about the vulnerability: https://t.co/VFu7NxJ3TQ Feel free to contribute to the search for a proper RCE sink!
Tweet card summary image
github.com
Explanation and full RCE PoC for CVE-2025-55182. Contribute to msanft/CVE-2025-55182 development by creating an account on GitHub.
4
70
355
@rauchg
Guillermo Rauch
10 days
Today we partnered with Meta to disclose a critical vulnerability in React Server Components, impacting Next.js. Huge credit to Lachlan Davidson for responsibly reporting this to Meta and to our industry partners for responding quickly to our call-to-action. This is how open
Tweet card summary image
vercel.com
Vercel has provided a patch for CVE-2025-55182 affecting any frameworks allowing Server Components usage.
30
54
700