vis_hacker's profile picture. Vishal Panchani security Engineer | hall of fame from Google ,paypal , brickftp and many more. keep calm and hack the planet. Top 10 in hackerone alltime

gujjuboy10x00

@vis_hacker

Vishal Panchani security Engineer | hall of fame from Google ,paypal , brickftp and many more. keep calm and hack the planet. Top 10 in hackerone alltime

Закреплено

Another milestone 😍, Its 2.5 years with h1 family and Finally Completed 20k reputation @Hacker0x01 . 2nd indian after @emgeekboy who just joined 20k club Next: more focus on signal #20kclub #togetherwehitharder #bugbounty

vis_hacker's tweet image. Another milestone 😍, Its 2.5 years with h1 family and Finally Completed 20k reputation @Hacker0x01 .
2nd indian after @emgeekboy who just joined 20k club
Next: more focus on signal  #20kclub #togetherwehitharder #bugbounty

Facts. Skills, mindset, and consistency.

You do not need Courses and Certificates to make your first 100k in InfoSec.



Do not sign any crypto transactions right now — a major NPM supply chain attack is redirecting approvals & transfers to attacker wallets.

I would strongly recommend not signing any crypto transactions right now. There is a huge supply chain attack on popular NPM packages that may have compromised various crypto websites (frontend, not the actual contracts). It changes the destination address of transactions and…



gujjuboy10x00 сделал(а) репост

Is the left really just a giant kleptocracy? The evidence increasingly suggests it is.


gujjuboy10x00 сделал(а) репост

Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! Read it all below 🧵

artsploit's tweet image. Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! Read it all below 🧵

gujjuboy10x00 сделал(а) репост

my daily ritual starts with this youtube.com/watch?v=1S1fIS…

PwnFunction's tweet card. Write in C

youtube.com

YouTube

Write in C


gujjuboy10x00 сделал(а) репост

How can this be called a “continuing resolution” if it includes a 40% pay increase for Congress?

There are two provisions buried in the CR that Congress is trying to slip by. A pay increase for members of Congress from $174,000 to $243,000 per year. Also, members of Congress are receiving an opt out from being required to use Obamacare

WallStreetMav's tweet image. There are two provisions buried in the CR that Congress is trying to slip by.

A pay increase for members of Congress from $174,000 to $243,000 per year.

Also, members of Congress are receiving an opt out from being required to use Obamacare


gujjuboy10x00 сделал(а) репост

Mario Draghi’s critique is accurate. A thorough review of EU regulations to eliminate unnecessary rules and streamline activity in Europe would revitalize growth and strengthen competitiveness. Things should be default legal, rather than default illegal.

Dear Mario Draghi, a year ago, I asked you to prepare a report on the future of Europe’s competitiveness. No one was better placed than you to take up this challenge. Now, we are eager to listen to your views ↓



gujjuboy10x00 сделал(а) репост

Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! blog.orange.tw/2024/08/confus… Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code…


gujjuboy10x00 сделал(а) репост

When researching request smuggling, I decided that TE.0 would never be exploitable because it requires the back-end server to accept a HTTP request starting with a number + newline.... and no server would be that crazy 🤦‍♂️ Awesome work! Never under-estimate the crazy.

This is one of the most widespread and impactful bugs I've ever found in my career. Great collab with @bsysop and @_medusa_1_ Smugglings are still out there—stay vigilant! #bugbounty @Bugcrowd bugcrowd.com/blog/unveiling…

sw33tLie's tweet image. This is one of the most widespread and impactful bugs I've ever found in my career. Great collab with @bsysop and @_medusa_1_ 

Smugglings are still out there—stay vigilant! #bugbounty @Bugcrowd

bugcrowd.com/blog/unveiling…


gujjuboy10x00 сделал(а) репост

Our security researcher @hash_kitten found one of the most critical exploit chains in the history of @assetnote. Affecting 40k+ instances of ServiceNow, we could execute arbitrary code, access all data without authentication. You can read our blog here: assetnote.io/resources/rese…

infosec_au's tweet image. Our security researcher @hash_kitten found one of the most critical exploit chains in the history of @assetnote. Affecting 40k+ instances of ServiceNow, we could  execute arbitrary code, access all data without authentication. You can read our blog here: assetnote.io/resources/rese…

gujjuboy10x00 сделал(а) репост

My first blog post! It's about CVE-2023-4369, a $10,000 bug I found in ChromeOS in July. The bug used a chrome:// URL XSS to allow Chrome extensions to execute privileged code and read/edit downloaded files without user interaction. 👀 0x44.xyz/blog/cve-2023-…


gujjuboy10x00 сделал(а) репост

I just published a write-up about an account takeover where I abused reverse proxy to hijack the OAuth Code. blog.voorivex.team/hijacking-oaut…


gujjuboy10x00 сделал(а) репост

I have finally done my first proper bug write-up! This one is about a SOP bypass in Chrome (escalated to ATO) using the Navigation API. Hope someone finds it interesting. Feel free to leave me any comments; I want to improve on this! joaxcar.com/blog/2023/10/0…


gujjuboy10x00 сделал(а) репост

New writeup on some interesting web app tech. Enjoy! #bugbounty bountyplz.xyz/bugbounty/2023…


gujjuboy10x00 сделал(а) репост

The impact achieved here is neat: labs.hakaioffsec.com/nginx-alias-tr… - I remember first reading about this from @fransrosen - blog.detectify.com/2020/11/10/com…


gujjuboy10x00 сделал(а) репост

Chrome has just unleashed popovers: modal dialogs without JS! Of course you can abuse them for XSS filter evasion: portswigger.net/web-security/c…

PortSwiggerRes's tweet image. Chrome has just unleashed popovers: modal dialogs without JS! Of course you can abuse them for XSS filter evasion:

portswigger.net/web-security/c…

gujjuboy10x00 сделал(а) репост

For a few months, @samwcyo, @bbuerhaus, @rhyselsmore and I focused on hacking EPP servers / ccTLD zones. We're disclosing our work today on the hackcompute blog: hackcompute.com/hacking-epp-se… Our efforts in this space led to the ability to control the DNS zones of the following…


gujjuboy10x00 сделал(а) репост

Last year, @Jhaddix, @bscarvell, @seanyeoh and I found a pre-auth RCE in Oracle Opera - CVE-2023-21932. This product holds the PII of every guest (including credit cards 😱). It's used by almost all of the big hotel/resort chains around the world. blog.assetnote.io/2023/04/30/rce… - 1/4

infosec_au's tweet image. Last year, @Jhaddix, @bscarvell, @seanyeoh and I found a pre-auth RCE in Oracle Opera - CVE-2023-21932. This product holds the PII of every guest (including credit cards 😱). It's used by almost all of the big hotel/resort chains around the world. blog.assetnote.io/2023/04/30/rce… - 1/4

gujjuboy10x00 сделал(а) репост

Some AppSeccy thoughts on the rule writing experience for CodeQL vs Semgrep spaceraccoon.dev/comparing-rule…


Loading...

Something went wrong.


Something went wrong.