Prompt injection
Nowadays AI security is crucial, you see most of the websites now add a chat bot based on an AI model and jail breaking it can really leak sensitive data
@reverseengineer101
Nowadays AI security is crucial, you see most of the websites now add a chat bot based on an AI model and jail breaking it can really leak sensitive data
@reverseengineer101
❤8
reverse engineering
Prompt injection Nowadays AI security is crucial, you see most of the websites now add a chat bot based on an AI model and jail breaking it can really leak sensitive data @reverseengineer101
Btw, I forgot to attach this link from OWASP top 10 for LLMs
https://owasp.org/www-project-top-10-for-large-language-model-applications/
https://owasp.org/www-project-top-10-for-large-language-model-applications/
owasp.org
OWASP Top 10 for Large Language Model Applications | OWASP Foundation
Aims to educate developers, designers, architects, managers, and organizations about the potential security risks when deploying and managing Large Language Models (LLMs)
❤9🔥2
Orbstack is a docker alternative
https://orbstack.dev/
@reverseengineer101
OrbStack is the fast, light, and easy way to run Docker containers and Linux. Develop at lightspeed with our Docker Desktop alternative.
https://orbstack.dev/
@reverseengineer101
OrbStack
OrbStack · Fast, light, simple Docker & Linux
Say goodbye to slow, clunky containers and VMs. The fast, light, and easy way to run containers and Linux. Develop at lightspeed with our Docker Desktop alternative.
❤4👏3🔥2
API Sec university is live !
@reverseengineer101
Live Session Alert: API Security Basics - A Bug Hunter's Perspectivein now on discord
Today's Live Discord [Session](https://discord.gg/4X6fXK5B?event=1444365577241104384) is starting in 5 minutes in the https://discord.com/channels/1009112852759593100/1329504546858205314 stage channel.
Join us NOW!
Jo
@reverseengineer101
Discord
Join the APIsec University Discord Server!
This is a community to discuss all things related to API security, get help with APIsec University Courses, or trouble shoot the APIsec Product. Be Kind. Be Professional. Learn. Grow. | 14614 members
👍4❤2
If you have a target that relay on GraphQL always test if the introspection is enabled or not (it shall not be in production systems but sometimes it is) once you enumerate the schema you can go to something like Graphql voyager for better understanding and getting all the relations between the objects or you can read the schema by yourself if it's small, then try to observe the most sensitive fields like users chats or passwords or ... then try to get it then you will find that GraphQL is just returning that to you
The reason why I am writing this because I recently found a massive leakage (user ip addresses, feedback chats, ...)in some crypto wallet
#Cyber_tips
@reverseengineer101
The reason why I am writing this because I recently found a massive leakage (user ip addresses, feedback chats, ...)in some crypto wallet
#Cyber_tips
@reverseengineer101
apis.guru
GraphQL Voyager
Represent any GraphQL API as an interactive graph
❤5
Well, I am proud enough and happy to say I got my first ACE (Arbitrary Code Execution)
It started with only exposed debugging point then I was able to execute JS over a Sandbox then I managed to escape it and if you are asking how the answer is I found another vulnerability which is prototype pollution and I was able to invoke some native JS as well like the constructor (like react2shell
Finally what I want to say that wasn't an easy thing to do I passed more than three days just trying and failing and trying. Nothing comes easy as you think
@reverseengineer101
It started with only exposed debugging point then I was able to execute JS over a Sandbox then I managed to escape it and if you are asking how the answer is I found another vulnerability which is prototype pollution and I was able to invoke some native JS as well like the constructor (like react2shell
constructor.constructor but mine is not the same vulnerability) this gave me the ability to explore some internals, I trying to leverage it more now maybe to get the full RCE (Remote Code Execution)Finally what I want to say that wasn't an easy thing to do I passed more than three days just trying and failing and trying. Nothing comes easy as you think
@reverseengineer101
🔥11❤🔥6❤5
reverse engineering
New video uploaded ! Intigriti's month (Nov 2025) challenge full walk through Watch on YouTube https://youtu.be/ZNYxws_LtWs Read the write-up on Medium https://medium.com/@mohamedabozaid961/intigritis-1125-challenge-walk-through-3e3c391f7699 The pdf version…
My write (M0habozaid) up got the third place in best write ups
https://bugology.intigriti.io/intigriti-monthly-challenges/1125
https://bugology.intigriti.io/intigriti-monthly-challenges/1125
🔥10❤9👍3❤🔥2
Forwarded from Fly Dragon Fly
Reverse Engineering
Android Internals Review
Setup Environments
Developer Options
Android Debug Bridge
Android Applications Structure
Dalvik Virtual Machine
Android Application Decompiling
Android Manifest
Permissions
Activities
Application Subclass
Intents
Broadcast Receivers
Services
Content Provider
Application Signing
Master Key vulnerability
Dex2jar
JADX-GUI
Androguard
Introduction To Smali
Dalvik Opcodes Cheatsheet
Smali File Structure
Control Flows Statements In Smali
Rooting Detection
Classes & Objects In Smali
Exception Handling In Smali
Debugging
Traffic Interception Theory in Android
How HTTPS Work?
Certificate Pinning
Certificate Pinning Bypass Methods
What is Frida?
Hooking Theory
Hands On Frida
Working with Objects/Instances
Manipulating UI Thread Using Frida
Hooking NDK Libraries
Overwriting C/C++ Method Using Frida
Analyzing C/C++ Library Using Ghidra
Frida without Root
Frida Scripts
Please open Telegram to view this post
VIEW IN TELEGRAM
Secure's Notion on Notion
Android Internals Review | Notion
Let’s briefly examine Android’s architecture from the bottom up. This figure show how’s a simplified representation of the Android stack.
❤13👍5🔥2
Meta posts the way you can use to intercept the traffic in Facebook (mobile app)
https://bugbounty.meta.com/learn/articles/mitmproxy-burp-tls13-workaround
https://bugbounty.meta.com/learn/articles/mitmproxy-burp-tls13-workaround
Meta
Intercepting Facebook Mobile Traffic with mitmproxy and Burp | Meta Bug Bounty
Step by step guide for security researchers using mitmproxy as an upstream proxy to downgrade TLS 1.3 traffic and intercept Facebook mobile traffic in Burp.
❤5👏2
Tiny XSS Payloads
In case of your target is vulnerable to xss but you have some limitations due to the WAF or filtering you can try them and you can costumize them as well
tinyxss.terjanq.me
Shared by @reverseengineer101
From intigriti on X (formally Twitter)
In case of your target is vulnerable to xss but you have some limitations due to the WAF or filtering you can try them and you can costumize them as well
tinyxss.terjanq.me
Shared by @reverseengineer101
From intigriti on X (formally Twitter)
🔥2❤1
Forwarded from Darksec
CVE-2026-21858 + CVE-2025-68613: n8n Ni8mare - Full Chain Exploit
Unauthenticated to Root RCE:
- LFI via Content-Type confusion
- Read /proc/self/environ to find HOME
- Steal encryption key + database
- Forge admin JWT token
- Expression injection sandbox bypass
- RCE as root
CVSS 10.0
https://github.com/Chocapikk/CVE-2026-21858
Unauthenticated to Root RCE:
- LFI via Content-Type confusion
- Read /proc/self/environ to find HOME
- Steal encryption key + database
- Forge admin JWT token
- Expression injection sandbox bypass
- RCE as root
CVSS 10.0
https://github.com/Chocapikk/CVE-2026-21858
GitHub
GitHub - Chocapikk/CVE-2026-21858: n8n Ni8mare - Unauthenticated Arbitrary File Read to RCE Chain (CVSS 10.0)
n8n Ni8mare - Unauthenticated Arbitrary File Read to RCE Chain (CVSS 10.0) - Chocapikk/CVE-2026-21858
❤🔥5🔥4🥰1