0xacb's Avatar

0xacb

@0xacb.com

Hacker grinding for L1gh7 and Fr33dφm, straight outta the cosmic realm. Co-founder @ethiack.com https://0xacb.com

1,442
Followers
100
Following
280
Posts
20.11.2024
Joined
Posts Following

Latest posts by 0xacb @0xacb.com

Preview
upCTF

I may have organized a challenge (or two) for upCTF by @xstf_team, starting in 14 hours!

Register now for a chance to win cool prizes 🥷

06.03.2026 18:00 👍 0 🔁 0 💬 0 📌 0
Youssef Sammouda (sam0) personal blog The goal of this blog is to share write-ups about bugs i have found in Facebook and reported to them under the Facebook bug bounty program.

This blog site of @samm0uda is a treasure trove of everything Meta (Facebook, Instagram, Oculus) hacking 👇

06.03.2026 15:04 👍 2 🔁 0 💬 1 📌 0
Black Hat USA 2025 | Lost in Translation: Exploiting Unicode Normalization
Black Hat USA 2025 | Lost in Translation: Exploiting Unicode Normalization As web applications evolve, so do their data processing pipelines—handling Unicode normalization, encoding, and translation before storing or executing user ...

Lost in Translation: Exploiting Unicode Normalization

With this research, ryancbarnett and 4ng3lhacker added another layer of understanding to this area. They introduced a lot of very interesting techniques.

Check it out 👇

04.03.2026 17:58 👍 0 🔁 0 💬 0 📌 0
Preview
Playing with HTTP/2 CONNECT - Flomb Blog In HTTP/1, the CONNECT method instructs a proxy to establish a TCP tunnel to a requested target. Once the tunnel is up, the proxy blindly forwards raw traffic in both directions. This mechanism is most commonly used to tunnel TLS traffic through forwarding proxies. While digging through the HTTP/2 s...

Playing with HTTP/2 CONNECT by @fl0mb.bsky.social 

This research explores how HTTP/2 CONNECT can be utilized for port scanning. It may also bypass traditional network inspection tools, which opens up a lot of possibilities.

Check the blog👇

03.03.2026 14:36 👍 2 🔁 0 💬 0 📌 0
Preview
The ultimate beginner’s guide to Android hacking | @Bugcrowd These are the droids you’re looking for.

Many people overlook Android hacking due to the challenges associated with configuring emulators and proxies.

Thankfully, there's a comprehensive guide from @bugcrowd.com that walks you through the setup process.

02.03.2026 17:06 👍 2 🔁 0 💬 0 📌 0

Tired of hitting 403 errors during your security testing? 

NoMore403 by @devploit automates bypass techniques to get past those pesky restrictions. 

Try it at 👇
github.com/devploit/nomore403

28.02.2026 11:34 👍 0 🔁 0 💬 0 📌 0
Preview
GitHub - jthack/cewlai: ai-based domain name generation ai-based domain name generation. Contribute to jthack/cewlai development by creating an account on GitHub.

CewlAI by @rez0__ takes your domains, learns the naming patterns, and generates new variations using Gemini, OpenAI, WhiteRabbitNeo, or a local Ollama model.

It's great to expand recon and improve permutations👇

27.02.2026 11:06 👍 0 🔁 0 💬 0 📌 0
Preview
GitHub - spaceraccoon/vulnerability-spoiler-alert-action: GitHub Action to alert on security patches before the CVE drops. GitHub Action to alert on security patches before the CVE drops. - spaceraccoon/vulnerability-spoiler-alert-action

Vulnerability Spoiler Alert Action by @spaceraccoonsec

It monitors repositories and uses Claude to detect patching of security vulns. This early warning can give security teams more time to patch before the CVE drops.

GitHub repo👇

24.02.2026 10:36 👍 0 🔁 1 💬 0 📌 0
Preview
Hackian and the Ghosts in Your Business Logic: When Your App’s Rules Are the Real Vulnerability | Ethiack — Autonomous Ethical Hacking for continuous security Hackian managed to exploit app rules logic in SonarQube by simply thinking outside the box - and got access to projects it wasn't supposed to. Curious? Read the full article.

Hackian uncovered interesting business logic flaws in SonarQube and n8n.

Blog post by @pcuco92👇

23.02.2026 17:42 👍 0 🔁 0 💬 0 📌 0

Replace "cross-site-scripting" with any other vulnerability type and your feed will be updated each time someone publishes an article with that tag.

Then, you can also combine this with AI/n8n etc to classify a post as interesting/novel and post to a Discord webhook, so you get notified about it.

20.02.2026 11:04 👍 0 🔁 0 💬 0 📌 0

Did you know that you can subscribe to topics using RSS on Medium?

For example, if you want to receive updates about cross-site scripting, simply use this link: 

https://medium[.]com/feed/tag/cross-site-scripting

20.02.2026 11:04 👍 1 🔁 0 💬 2 📌 0
Preview
GitHub - projectdiscovery/asnmap: Go CLI and Library for quickly mapping organization network ranges using ASN information. Go CLI and Library for quickly mapping organization network ranges using ASN information. - projectdiscovery/asnmap

ASN/CIDR lookups are massively underrated for recon.

Start with a company name. Find all their assets. Get instant ASN to CIDR lookups, IP/DNS/ORG resolution, and JSON/CSV output 👇

19.02.2026 16:14 👍 3 🔁 0 💬 1 📌 0
Preview
Build software better, together GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.

ASN/CIDR lookups are massively underrated for recon.

Start with a company name. Find all their assets. Get instant ASN to CIDR lookups, IP/DNS/ORG resolution, and JSON/CSV output 👇

19.02.2026 11:07 👍 0 🔁 0 💬 0 📌 0
Agentic ProbLLMs: Exploiting AI Computer-Use and Coding Agents | Johann Rehberger | HackAICon 2025
Agentic ProbLLMs: Exploiting AI Computer-Use and Coding Agents | Johann Rehberger | HackAICon 2025 Read the complete article:https://ethiack.com/news/blog/agentic-problems-and-zombie-aiFollow Johann Rehberger:https://x.com/wunderwuzzi23https://embracethere...

Agentic ProbLLMs: Exploiting AI Computer-use and Coding Agents - by @wunderwuzzi23

18.02.2026 14:32 👍 0 🔁 0 💬 0 📌 0
How I Exposed Instagram's Private Posts by Blocking Users Discover how a security loophole in Instagram's oEmbed feature enabled unauthorized access to private posts. Journey from BountyCon(Edu) to the vulnerability's discovery, exploitation, and resolution.

Exposing Instagram posts from private users. A writeup by @rub003 

12.02.2026 11:02 👍 3 🔁 1 💬 0 📌 0
Preview
Security - OpenClaw

Openclaw (Clawdbot) is cool and all but it’s also risky.

Make sure you get your bot audited with some better security practices 👇 

https://auth0.com/blog/five-step-guide-securing-moltbot-ai-agent/

10.02.2026 11:03 👍 0 🔁 1 💬 0 📌 0
Video thumbnail

Manually hunting for endpoints and hidden parms in web apps?

Another nice tool from xnl_h4ck3r is xnLinkFinder that crawls targets, extracts links, discovers secrets, and builds target-specific wordlists.

Try it out 👇
https://github.com/xnl-h4ck3r/xnLinkFinder

06.02.2026 11:04 👍 2 🔁 0 💬 0 📌 0
Preview
Starbucks disclosed on HackerOne: RCE and Complete Server Takeover... This report from @spaceraccoon demonstrated a valid attack resulting in RCE and full compromise of the target. The detailed and thorough report was especially helpful throughout the triage process,...

404 page to RCE. A report by Spaceraccoon

Chained CVE-2007-0450 (mod_proxy traversal via %5C../) + CVE-2007-1036 (exposed JBoss console) + Java deserialization RCE with jexboss

Full report 👇

03.02.2026 10:06 👍 2 🔁 1 💬 0 📌 0
Preview
One-click RCE on Clawd/Moltbot in under 2 hours with an Autonomous Hacking Agent | Ethiack — Autonomous Ethical Hacking for continuous security Our AI pentester, Hackian, found a RCE on Clawdbot/Moltbot by hacking it fully autonomously in under 2 hours. Learn how and read the logs in this blog.

Full details:

02.02.2026 09:07 👍 1 🔁 0 💬 0 📌 0

- WebSocket CORS Bypass: No origin validation means attackers can reach localhost through the victim's browser

- Instant RCE: Stolen token = full system access via arbitrary commands.

02.02.2026 09:07 👍 0 🔁 0 💬 1 📌 0

- gatewayUrl Parameter: A GET parameter automatically overrides the WebSocket gateway URL used by the Control UI

- Token Exfiltration: Visiting a malicious link leaks the victim's auth token to the attacker's server

02.02.2026 09:07 👍 0 🔁 0 💬 1 📌 0
Post image

💥 One click could completely compromise a OpenClaw / Moltbot / Clawdbot (CVE-2026-25253)

The vulnerability is now fixed, but here's how it worked:

02.02.2026 09:07 👍 0 🔁 0 💬 1 📌 0

- gatewayUrl Parameter: A GET parameter automatically overrides the WebSocket gateway URL used by the Control UI

- Token Exfiltration: Visiting a malicious link leaks the victim's auth token to the attacker's server

02.02.2026 01:37 👍 0 🔁 0 💬 0 📌 0
Never Trust the Output: Data Pollution in AI Agents and MCP Disclaimer: This article is intended for educational purposes and security specialists conducting authorized testing. The author assumes no responsibility for any misuse of the information provided. Distribution of malicious software, system disruption, and privacy violations are punishable by law. Introduction I’m sure most of you are already familiar with the concept of Prompt Injection and its various consequences. However, in 2026, any AI model without MCP (Model Context Protocol) servers can’t reach its full potential — that’s why developers are connecting numerous MCP servers to extend their capabilities.

Very interesting techniques by Slonser.

If your AI agent is reading external data (especially from MCP servers), proceed with caution. Incoming data might trick your model into executing unintended actions.

Blog link 👇

01.02.2026 09:39 👍 0 🔁 0 💬 0 📌 0
Post image

Need to find the APIs the devs forgot about?

Combine waymore with xnLinkFinder or similar.

- waymore: Gathers the archived URL responses.
- xnLinkFinder: Extracts the hidden paths and parameters.

GitHub repos 👇

https://github.com/xnl-h4ck3r/waymore
https://github.com/xnl-h4ck3r/xnLinkFinder

31.01.2026 10:03 👍 1 🔁 0 💬 0 📌 0
Preview
GitHub - ethiack/moltbot-1click-rce: Moltbot One-click RCE PoC Moltbot One-click RCE PoC. Contribute to ethiack/moltbot-1click-rce development by creating an account on GitHub.

PoC repository:

29.01.2026 16:38 👍 0 🔁 0 💬 0 📌 0
Preview
One-click RCE on Clawd/Moltbot in under 2 hours with an Autonomous Hacking Agent | Ethiack — Autonomous Ethical Hacking for continuous security Our AI pentester, Hackian, found a RCE on Clawdbot/Moltbot by hacking it fully autonomously in under 2 hours. Learn how and read the logs in this blog.

By @hjsbranq, @s3np41k1r1t0 and team. 

Blog post:

29.01.2026 16:38 👍 0 🔁 0 💬 1 📌 0
Video thumbnail

Our pentesting agent found a 1-click ATO to RCE in @moltbot Gateway Control UI in under 2 hours.

Local instances can also be exploited with one click.

Patched in main, update now.

Watch the exploit 👇

29.01.2026 16:38 👍 0 🔁 1 💬 1 📌 0
These aren't the access_tokens you're looking for

This blog by @phwd_ has always been a great inspiration. It's a goldmine of everything about hacking @meta

Blog link 👇

28.01.2026 10:27 👍 0 🔁 0 💬 0 📌 0

It's been a while since I've tried to find bugs in Facebook. Maybe it's time to look into the new stuff.

I remember the days when we spent one entire day intercepting mobile app traffic by patching a native lib when nobody knew about it and finding an open redirect on instagram[.]com///evil.com

28.01.2026 10:27 👍 1 🔁 0 💬 1 📌 0