niksthehacker's profile picture. Founder @BSidesAhmedabad | Speaker @Blackhatmea @defcon | Board of Advisor @riskprofilerio | Legend @synackredteam

nikhil(niks)

@niksthehacker

Founder @BSidesAhmedabad | Speaker @Blackhatmea @defcon | Board of Advisor @riskprofilerio | Legend @synackredteam

nikhil(niks) 님이 재게시함

The blog.mantrainfosec.com/blog/18/prepar… post by @xoreipeip shows how prepared statements can be exploited in NodeJS using mysql and mysql2 packages leading to SQLi! 🪄 So use of prepared statement might not be the ultimate solution here 🥵 as a side note, @xoreipeip later found this…


nikhil(niks) 님이 재게시함

A penetration tester got root access to our Kubernetes cluster in 15 minutes. Here's what they exploited. The attack chain: - Found exposed Kubernetes dashboard (our bad) - Dashboard had view-only service account (we thought this was safe) - Service account could list secrets…


nikhil(niks) 님이 재게시함

The scammers are evolving 💀

Jeremybtc's tweet image. The scammers are evolving 💀

nikhil(niks) 님이 재게시함

The security vulnerability we found in Perplexity’s Comet browser this summer is not an isolated issue. Indirect prompt injections are a systemic problem facing Comet and other AI-powered browsers. Today we’re publishing details on more security vulnerabilities we uncovered.


nikhil(niks) 님이 재게시함

OMG.. whatsapp 0c in pwn2own

l33d0hyun's tweet image. OMG.. whatsapp 0c in pwn2own

nikhil(niks) 님이 재게시함

We just launched a $4.5m bug bounty live hacking event competition targeting the most popular cloud & ai open source software 🧵

galnagli's tweet image. We just launched a $4.5m bug bounty live hacking event competition targeting the most popular cloud & ai open source software 🧵

nikhil(niks) 님이 재게시함

The watchTowr Labs team is back, providing our full analysis of the Oracle E-Business Suite Pre-Auth RCE exploit chain (CVE-2025-61882). Enjoy with us (or cry, your choice..) labs.watchtowr.com/well-well-well…


nikhil(niks) 님이 재게시함

The team at @OpenAI just fixed a critical account takeover vulnerability I reported few hours ago affecting #ChatGPT. It was possible to takeover someone's account, view their chat history, and access their billing information without them ever realizing it. Breakdown below 👇


nikhil(niks) 님이 재게시함

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…


nikhil(niks) 님이 재게시함

The @ReconVillage at @DEFCON 33 explored the digital terrain with Live Recon, GE(O)SINT, CTFs & labs. 🗺️ 🔍 Shoutout to @NahamSec @Jhaddix @DanielMiessler @InfosecVandana @niksthehacker @jeff_foley @anantshri & others! All #DEFCON33 villages 👇🏽 infosecmap.com/event/def-con-… #InfoSec

InfoSecMap's tweet image. The @ReconVillage at @DEFCON 33 explored the digital terrain with Live Recon, GE(O)SINT, CTFs & labs. 🗺️ 🔍

Shoutout to @NahamSec @Jhaddix @DanielMiessler @InfosecVandana @niksthehacker @jeff_foley @anantshri & others!

All #DEFCON33 villages 👇🏽
infosecmap.com/event/def-con-…

#InfoSec

nikhil(niks) 님이 재게시함

Had an amazing time at my first #BSidesAhmedabad 🎉 Great discussions, diverse connections & of course the mandatory MSRC team pic + group selfies 📸

shreyapohekar's tweet image. Had an amazing time at my first #BSidesAhmedabad 🎉 Great discussions, diverse connections & of course the mandatory MSRC team pic + group selfies 📸
shreyapohekar's tweet image. Had an amazing time at my first #BSidesAhmedabad 🎉 Great discussions, diverse connections & of course the mandatory MSRC team pic + group selfies 📸
shreyapohekar's tweet image. Had an amazing time at my first #BSidesAhmedabad 🎉 Great discussions, diverse connections & of course the mandatory MSRC team pic + group selfies 📸
shreyapohekar's tweet image. Had an amazing time at my first #BSidesAhmedabad 🎉 Great discussions, diverse connections & of course the mandatory MSRC team pic + group selfies 📸

No doubt, the fieriest panel of all🔥🔥

I will be at @bsidesahmedabad this year to talk about bug bounty and security with John Deere CISO Carl Kubalsky on 12th and 13th in an open Panel. If you are around please come say high :)



nikhil(niks) 님이 재게시함

When the hunters of threats join the battlefield, you know the game changes. ⚔️🛡️ We’re beyond thrilled to announce @CrowdStrike as the Cyber Security Partner at BSides Ahmedabad 0x06 — bringing the power of Falcon intelligence to the most awaited cyber security gathering of the…

bsidesahmedabad's tweet image. When the hunters of threats join the battlefield, you know the game changes. ⚔️🛡️

We’re beyond thrilled to announce @CrowdStrike as the Cyber Security Partner at BSides Ahmedabad 0x06 — bringing the power of Falcon intelligence to the most awaited cyber security gathering of the…

nikhil(niks) 님이 재게시함

Sept 12–13: BSides Ahmedabad 🇮🇳 — Positive Technologies Offensive Team from @ptswarm with talks, networking & fresh research. Sept 13: Standoff Hacks finale — top bug hunters, private bounty scope & party. @amoshkov has the secret code for the grand party, DM him to crash it 👀

PTsecurity_EN's tweet image. Sept 12–13: BSides Ahmedabad 🇮🇳 — Positive Technologies Offensive Team from @ptswarm with talks, networking & fresh research.
Sept 13: Standoff Hacks finale — top bug hunters, private bounty scope & party. @amoshkov has the secret code for the grand party,  DM him to crash it 👀

nikhil(niks) 님이 재게시함

🇮🇳 Independence = Incredible Savings! This Independence Day, BSides Ahmedabad is celebrating with you! Grab your passes now and enjoy a patriotic 15% discount because liberty deserves a great learning party!🎉 Use coupon code “FREEDOM” & get 15% Off on Delegate & Professional…

bsidesahmedabad's tweet image. 🇮🇳 Independence = Incredible Savings!

This Independence Day, BSides Ahmedabad is celebrating with you! Grab your passes now and enjoy a patriotic 15% discount because liberty deserves a great learning party!🎉 

Use coupon code “FREEDOM” & get 15% Off on Delegate & Professional…

nikhil(niks) 님이 재게시함

🟥🟦 CTF teams, take note — Standoff Cyberbattle 16, October 6–8, online. 💰 $17,500 prize pool. 30 hours of pure Attack–Defence. 1500+ real-world systems, PLC/SCADA included, 30 hours of epic battle. Apply by Sept 1 → 16.standoff365.com/en/

amoshkov's tweet image. 🟥🟦 CTF teams, take note — Standoff Cyberbattle 16, October 6–8, online. 💰 $17,500 prize pool.

30 hours of pure Attack–Defence. 1500+ real-world systems, PLC/SCADA included, 30 hours of epic battle.

Apply by Sept 1 → 16.standoff365.com/en/

nikhil(niks) 님이 재게시함

The @SLCyberSec research team is releasing our final research post for our Christmas in July efforts, two RCEs and one XXE (all pre-auth) in Adobe Experience Manager Forms. One of the RCEs and the XXE still do not have official patches: slcyber.io/assetnote-secu…


nikhil(niks) 님이 재게시함

🚨 Only 45 Days to Go! 🚨 BSides Ahmedabad 0x06 is almost here! 🎟️ Grab your pass NOW to witness the finest in cybersecurity — where cyber brilliance meets real-world defense➡️🔗konfhub.com/security-bside… Don’t just hear about it — be there. #BSidesAhmedabad #CyberSecurity

bsidesahmedabad's tweet image. 🚨 Only 45 Days to Go! 🚨
BSides Ahmedabad 0x06 is almost here!

🎟️ Grab your pass NOW to witness the finest in cybersecurity — where cyber brilliance meets real-world defense➡️🔗konfhub.com/security-bside…

Don’t just hear about it — be there.

#BSidesAhmedabad #CyberSecurity…

nikhil(niks) 님이 재게시함

I have launched YSoNet (ysonet.net) and added #SharePoint CVE-2025-49704 payload generator to it as the first thing. Here is how this can work: Running command: ``` ysonet.exe -p sharepoint --cve=CVE-2025-49704 -var 1 -c "calc" ``` Running C# code: ``` ysonet.exe…


nikhil(niks) 님이 재게시함

Blog for ToolShell Disclaimer: The content of this blog is provided for educational and informational purposes only. blog.viettelcybersecurity.com/sharepoint-too… #SharePoint #ToolShell

_l0gg's tweet image. Blog for ToolShell
Disclaimer: The content of this blog is provided for educational and informational purposes only.
blog.viettelcybersecurity.com/sharepoint-too…
#SharePoint #ToolShell

Loading...

Something went wrong.


Something went wrong.