Advertisement · 728 × 90

Posts by s1r1us | Mohan Sri Rama Krishna Pedhapati

Hacking Windsurf: I Asked the AI for System Access — It Said Yes
Hacking Windsurf: I Asked the AI for System Access — It Said Yes YouTube video by Mrgavyadha

Hacking Windsurf: I asked the AI for the shell, it said yes.

new video’s out. I show how I could’ve hacked you… just by getting you to click my link.

Link posted below.
www.youtube.com/watch?v=23Mz...

10 months ago 4 1 1 0

elon is the epitome of a perpetual dopamine-craving machine fueled by social validation.

sends rockets to space, yet still hunger for something more, X became the playground, recent gaming fiasco says it all.

gotta keep the right brain in check with the left brain.

1 year ago 2 0 0 0

😅🤣.

1 year ago 4 0 0 0

just wondering, infosec people using this site 🤔? just looked at analytics of same post on linkedin, x and this.

there is no reach here, good that I didn't deleted the other app.

1 year ago 5 0 0 0
Hacking Discord for $5000 Bounty
Hacking Discord for $5000 Bounty YouTube video by Mrgavyadha

Imagine opening a Discord message and suddenly your computer is hacked.

We discovered a bug that made this possible and earned a $5,000 bounty for it.

Here's the story and a beginner-friendly deep dive into V8 exploit development.

watch: youtu.be/R3SE4VKj678?...

1 year ago 18 8 1 1

yes

1 year ago 2 0 0 0
Post image

via @mohansrk.bsky.social on the other site

1 year ago 3 1 0 0

true, the absence of evidence !== evidence of absence.

1 year ago 1 0 0 0
Advertisement

queued up tonight but just missed out, if anyone is selling tickets, looking for two tickets to ccc #38c3

1 year ago 5 2 0 0

was looking at gitlab code and damn @joaxcar.bsky.social is everywhere. talk about niche 😅

1 year ago 4 0 0 0
Post image

i hate that they didn’t used real galaxy not some fake dots. it literally haunts me every-time i open this app.

1 year ago 1 0 0 0
Remote Code Execution with Spring Properties Recently a past student came to me with a very interesting unauthenticated vulnerability in a Spring application that they were having a hard time exploiting...

I just wrote a new blog post! This is how I (ab)used a jailed file write bug in Tomcat/Spring. Enjoy!

Remote Code Execution with Spring Properties :: srcincite.io/blog/2024/11...

1 year ago 76 36 1 2
Modern solutions against cross-site attacks Modern solutions against cross-site attacks

Modern solutions against cross-site attacks (frederikbraun.de/modern-solut...): An article about cross-site leak attacks and browser-based defenses. You will also learn why web security best practices is always opt-in and finally how YOU can get increased security controls.

1 year ago 34 19 0 1

So there is no algorithm for intelligence?

Elephants, whales, and dolphins = Big brains (large N), but limited data (D) & compute (C).

Falcons, dragonflies, hummingbirds = Insane compute (C), but tiny brains (N) & limited data (D).

Humans have balanced D, C, and N?

1 year ago 0 0 0 0

👋

1 year ago 1 0 0 0
Advertisement

can i recommend myself.

1 year ago 1 0 1 0

How can I do ROP with a reliable offset to the libc base or libsystem_c.dylib?

I am calculating the system address using the printf pointer from GOT table, but the offset to the GOT table or the offset from printf to system seems to vary across computers with different configurations for same app.

1 year ago 0 0 1 0

hello world

1 year ago 2 0 0 0