Pinaki ❄️ (@0xinfection) 's Twitter Profile
Pinaki ❄️

@0xinfection

I am just an Infected Geek. \o/

ID: 967626624924508160

linkhttps://github.com/0xInfection calendar_today25-02-2018 05:05:39

738 Tweet

6,6K Takipçi

146 Takip Edilen

Pinaki ❄️ (@0xinfection) 's Twitter Profile Photo

We published a write-up on the recent "Dirty Pipe" Linux Kernel Privilege Escalation vulnerability (CVE-2022-0847). Blog includes a demo of how the exploit works in gaining privilege escalation. :) redhuntlabs.com/blog/the-dirty…

We published a write-up on the recent "Dirty Pipe" Linux Kernel Privilege Escalation vulnerability (CVE-2022-0847). Blog includes a demo of how the exploit works in gaining privilege escalation. :)

redhuntlabs.com/blog/the-dirty…
Pinaki ❄️ (@0xinfection) 's Twitter Profile Photo

Been participating in an event from Intigriti where we tried getting around the OWASP Core Rule Set. Shoutout to Intigiti and the CRS team for managing the event so well. Couldn't grind a lot this time but would love to see more events like this. :) #1337up0522

Been participating in an event from <a href="/intigriti/">Intigriti</a> where we tried getting around the OWASP <a href="/CoreRuleSet/">Core Rule Set</a>. Shoutout to Intigiti and the CRS team for managing the event so well. Couldn't grind a lot this time but would love to see more events like this. :)

#1337up0522
Pinaki ❄️ (@0xinfection) 's Twitter Profile Photo

I wrote ConfluentPwn — an automated scanner to find vulnerable instances of the unauthenticated Confluence ONGL injection RCE vulnerability (CVE-2022-26134). Demo attached in the GIF below. github.com/redhuntlabs/Co… Features and feedbacks appreciated! :)

Pinaki ❄️ (@0xinfection) 's Twitter Profile Photo

Published a blog on an internet scale research around secrets exposed via the frontend of websites. Releasing a community version of the tool used for the study as well! :) Blog: redhuntlabs.com/blog/millions-… Tool: github.com/redhuntlabs/HT… Video: youtube.com/watch?v=qc8Mm2…

Published a blog on an internet scale research around secrets exposed via the frontend of websites. Releasing a community version of the tool used for the study as well! :)

Blog: redhuntlabs.com/blog/millions-…
Tool: github.com/redhuntlabs/HT…
Video: youtube.com/watch?v=qc8Mm2…
Clint Gibler (@clintgibler) 's Twitter Profile Photo

🚨 Millions Of Secrets Exposed Via Web Application Frontend Pinaki ❄️ describes scanning at scale for secrets in HTML and client-side JS as well as from error/debug pages Tool: github.com/redhuntlabs/ht… #bugbounty #bugbountytips redhuntlabs.com/blog/millions-…

Pinaki ❄️ (@0xinfection) 's Twitter Profile Photo

Attended the on-site LHE in Antwerp, learnt a lot of things, met a lot of amazing people, and had a lot of crazy fun! Cheers to Intigriti and The Paranoids for organizing such an fantastic event! ✨ #1337UP0822 #HackWithIntigriti

Attended the on-site LHE in Antwerp, learnt a lot of things, met a lot of amazing people, and had a lot of crazy fun!

Cheers to <a href="/intigriti/">Intigriti</a> and <a href="/TheParanoids/">The Paranoids</a> for organizing such an fantastic event! ✨

#1337UP0822 #HackWithIntigriti
Pinaki ❄️ (@0xinfection) 's Twitter Profile Photo

Really enjoyed the F1 Qualifiers at Spa Francorchamps. What a remarkable way to end a live hacking event! ✨ Heartiest gratitude to Intigriti and The Paranoids for making this happen and having me in this! ♥️

Pinaki ❄️ (@0xinfection) 's Twitter Profile Photo

This is not how anyone should use OSINT. This "challenge" is meaningless platitude. This thread post lays out a playbook for others to abuse OSINT. Please take a step back and consider what you’ve posted and all the different ways it could be misused.

Pinaki ❄️ (@0xinfection) 's Twitter Profile Photo

Recently, I was doing some research on #Kubernetes and scanned the entire IPv4 space for vulnerable clusters. Published a blog detailing the results: redhuntlabs.com/blog/unsecured… Also releasing a tool to detect exposed components studied in the research: github.com/redhuntlabs/ku…

Recently, I was doing some research on #Kubernetes and scanned the entire IPv4 space for vulnerable clusters. Published a blog detailing the results: redhuntlabs.com/blog/unsecured…

Also releasing a tool to detect exposed components studied in the research: github.com/redhuntlabs/ku…
Pinaki ❄️ (@0xinfection) 's Twitter Profile Photo

Can't believe its been over 2 months the event happened. Hacking cool targets, meeting hackers from around the world, what more could you ask for? 😄 Once again, cheers to Intigriti and The Paranoids for organizing such a fun-filled event timeline! youtu.be/XeICEz81zuw

Pinaki ❄️ (@0xinfection) 's Twitter Profile Photo

Back in 2022, I found a (stupid) local privilege escalation vulnerability in QuickHeal's SEQRITE Endpoint Security (EPS) AV product. Today I'm dropping some vulnerability details and a PoC exploit for the LPE. CVE and blogpost soon! 😄 Exploit: github.com/0xInfection/EP…

HackGit (@hack_git) 's Twitter Profile Photo

EPScalate An elevation of privilege vulnerability in QuickHeal's Seqrite Enterprise Endpoint Security Solution (EPS). github.com/0xinfection/ep… #cybersecurity #infosec #redteam

Pinaki ❄️ (@0xinfection) 's Twitter Profile Photo

TIL: Terrapin Attack on SSH tunnels terrapin-attack.com Implementation of the fix in LibSSH2: github.com/libssh2/libssh…

Binni Shah (@binitamshah) 's Twitter Profile Photo

WhatWaf : Detect and bypass web application firewalls and protection systems : github.com/Ekultek/WhatWaf WAFW00F : It allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website : github.com/EnableSecurity… credits Sandro Gauci Pinaki ❄️

watchTowr (@watchtowrcyber) 's Twitter Profile Photo

8 million requests, $400 later - we’re back. 🚀 We have demonstrated supply chain attacks that could have allowed us to trivially compromise critical infra. networks, including .gov, .mil, and more. This is real Attack Surface Management. labs.watchtowr.com/8-million-requ…

Pinaki ❄️ (@0xinfection) 's Twitter Profile Photo

TIL: there are apparently 1.4k potentially malicious MCP servers on GitHub. Cool research from VirusTotal! blog.virustotal.com/2025/06/what-1…

0x6c75696a616974 (@luijait_) 's Twitter Profile Photo

Xbow raised $117M to build AI hacker agents, in Alias Robotics open-sourced it and made it completely free. Github: github.com/aliasrobotics/… Paper: arxiv.org/abs/2504.06017

Pinaki ❄️ (@0xinfection) 's Twitter Profile Photo

Published something that has been sitting in my drafts for quite sometime. This one is all about the cool bypasses that I stumbled upon during 1337UP0522 live hacking event where we tried to bypass ModSecurity CRS. 0xinfection.xyz/posts/breaking…

Published something that has been sitting in my drafts for quite sometime.

This one is all about the cool bypasses that I stumbled upon during 1337UP0522 live hacking event where we tried to bypass ModSecurity CRS.

0xinfection.xyz/posts/breaking…