sshell_ Profile Banner
sshell Profile
sshell

@sshell_

Followers
10K
Following
39K
Media
893
Statuses
6K

ai + security research. ccdc red team. tummy ache survivor.

Virginia, USA
Joined June 2013
Don't wanna be here? Send us removal request.
@sshell_
sshell
2 years
professional hacking tip: be nice to people.
3
21
157
@sshell_
sshell
19 hours
RT @samwcyo: When applying for a job at McDonald's, over 90% of franchises use "Olivia," an AI-powered chatbot. We (@iangcarroll and I) dis….
0
88
0
@sshell_
sshell
2 days
RT @jackhcable: Update: @cluely filed a DMCA takedown for my tweet about their system prompt, alleging that it contained "proprietary sourc….
0
282
0
@sshell_
sshell
3 days
RT @xEHLE_: New writeup:. Early last month, @samwcyo, @sshell_, and I found a Django ORM injection in an online shooter game that let us st….
0
72
0
@sshell_
sshell
5 days
And remember, even though they announce a “winner” every year, we all know @CCDCRedTeam is the real winner 😂. Huge shouts out to @1njection @alexlevinson @egyp7 @Hultoko and everyone else who I had the privilege of playing with this year!.
0
0
3
@sshell_
sshell
5 days
New blog post about all the fun I had red teaming at @NationalCCDC this year!.Covers some of the fun we had this year specifically relating to the web side of things, as well as some tips and resources for competitors & those interested in participating.
3
48
172
@sshell_
sshell
6 days
Used this trick go find a bug in a big AI app where I could read everyone’s private conversations!. TLDR: You can do greater/less-than queries against UUIDs because in Supabase they’re stored like 128-bit integers. Thanks to @rez0__ and @Rhynorater for the shoutout on the pod!.
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
6 days
You NEED to See This UUID Trick
4
21
143
@sshell_
sshell
6 days
RT @rez0__: Uhhh yeah you can do lt.UUIDHERE.
0
2
0
@sshell_
sshell
9 days
RT @infosec_au: To kick off our Christmas and July research posts, we explain how we achieved persistent XSS on every Adobe Experience Mana….
0
38
0
@sshell_
sshell
10 days
RT @greglesnewich: Fun crossover blog about TA829 (RomCom) & TransferLoader with my ecrime pals it’s got everything:. 🛰️ Popped routers for….
0
21
0
@sshell_
sshell
10 days
RT @infosec_au: We’re celebrating Christmas in July this year, starting July 1st. We’ll release a security research post on Searchlight Cyb….
0
15
0
@sshell_
sshell
10 days
RT @nullpt_rs: Reverse Engineering Vercel's BotID by @blastbots .
Tweet media one
0
20
0
@sshell_
sshell
12 days
RT @noperator: a lil tool that I've needed for a long time
0
7
0
@sshell_
sshell
17 days
RT @infosec_au: How do we turn bad SSRF (blind) into good SSRF (full response)? The @assetnote Security Research team at @SLCyberSec used a….
0
179
0
@sshell_
sshell
18 days
RT @jackhcable: I reverse engineered @cluely – and their desktop source code exposes their entire system prompts and models used. What's i….
0
502
0
@sshell_
sshell
19 days
RT @binarygolf: BGGP6 will happen fall/winter 2025 instead of our usual summer event! Stay tuned for more details.
0
10
0
@sshell_
sshell
20 days
RT @nullpt_rs: Breaking WebAuthn, FIDO2, and Forging Passkeys by @vmfunc .
Tweet media one
0
20
0
@sshell_
sshell
21 days
i'm so hired of seeing these 16 BILLION CREDENTIALS LEAKED!!! stories. it was like 15 billion of the SAME CREDENTIALS last time the news ran this tired clickbait story. It will be 17 billion next time.
Tweet media one
4
2
28
@sshell_
sshell
22 days
RT @birchb0y: excited bc today @HuntressLabs is releasing our analysis of a gnarly intrusion into a web3 company by the DPRK's BlueNoroff!!….
0
95
0
@sshell_
sshell
27 days
RT @spaceraccoonsec: To everyone who pre-ordered "From Day Zero to Zero Day" – thank you for your patience. The wait is almost over. We'r….
0
30
0
@sshell_
sshell
30 days
when i talk about o3-pro being impressive at thinking through security problems, this is the kind of answer i'm talking about. the answers i get from every other model (gemini pro 2.5 and normal o3 included) is essentially just different flavors of "response hashing and regex".
@sshell_
sshell
30 days
@vmfunc when asking "how to fingerprint web apps without version numbers" o3-pro said all of the normal stuff, but THEN also went down to checking for function similarity at the javascript bytecode level and a "train a simple TF‑IDF + cosine similarity classifier" to map bundle versions.
0
0
3