Small tip for the JavaScript reverse engineers out there, Chrome has a `debug()` function which triggers a breakpoint whenever its first argument is called. It even works on built-in methods, no more wrapping stuff in proxies :D
debug(DOMParser.prototype.parseFromString)
35K Followers 255 FollowingWe help secure the world’s most targeted organizations and products. We combine security research with an attacker mentality to reduce risk and fortify code.
7K Followers 182 FollowingProvide one-stop world class robust effective Cybersecurity solutions which is required for current & future state of the art technology.
147K Followers 2K FollowingI share tactics and humor to help you save time with AI and craft better products | Join 125K+ readers at https://t.co/XYKTmGVH14 | Product at Roblox
298K Followers 1K FollowingLed a couple of Stripe's most successful products from early days. Prev Twitter, Google, Yahoo. Now advising & teaching. Tweets useful for some—not for everyone
30K Followers 2K FollowingI help you think like elite product leaders every day • 120+ AI mega-prompts that skip years of learning • See what's inside ↓
66K Followers 643 FollowingVolunteer-driven community of global product leaders & enthusiasts. Come for the content, stay for the community🍕🔥➡️ @0xTPH @TPFJobs
64K Followers 927 FollowingI like writing silly Tweets, but that doesn't pay so I also type at @googledeepmind. Principal Engineer. ex-@googlechrome. volunteer @2ndharvest. 🇺🇸🇨🇷
47K Followers 2K FollowingChief Technical Innovation Officer @crowdstrike. Windows Internals author and trainer. He/Him. RTs are not endorsements, opinions are my own.
61K Followers 804 FollowingSecurity Researcher. Previously Google Project Zero and TAG | 0days all day. Love all things bytes, assembly, and glitter. she/her.
28K Followers 395 Followingthis account is no longer monitored
i primarily post on whitequark at mastodon dot social, or elsewhere under the same username
2010-2024 bye!
3K Followers 917 Followinghttps://t.co/9I6nRUiFjm is a service that provides threat intelligence data about observed network scanning and cyber attacks.