Sharan Panegav (@panegavsharan) 's Twitter Profile
Sharan Panegav

@panegavsharan

InfoSec Enthusiast, Bug Hunter, Dota 2 Addict

ID: 854241424799354880

linkhttp://github.com/Shapa7276/ calendar_today18-04-2017 07:53:21

677 Tweet

616 Takipçi

446 Takip Edilen

Bug Bounty Shorts (@bugbountyshorts) 's Twitter Profile Photo

Explore the art of HTTP Request Smuggling and learn how to exploit this critical vulnerability that can lead to session hijacking, as demonstrated by Custodio in a successful bug bounty hunt worth $6500. #BugBounty #Cybersecurity medium.com/@rizn0x0cruz/h…

Bug Bounty Shorts (@bugbountyshorts) 's Twitter Profile Photo

This article unveils 5 key insights demonstrating ChatGPT's edge over DeepSeek AI R1, understanding and adaptability to its user-friendly interface. Learn how ChatGPT outshines competitors for a superior AI experience.#DeepSeek #DeepSeekR1 #ChatGPT tinyurl.com/3xj5ynxc

Bug Bounty Shorts (@bugbountyshorts) 's Twitter Profile Photo

Discover the power of Routersploit, an open-source tool revolutionizing cybersecurity! Learn how to exploit common vulnerabilities in routers and IoT devices for comprehensive network assessments. #BugHunting #Cybersecurity tinyurl.com/279qzc5f 1/1

Bug Bounty Shorts (@bugbountyshorts) 's Twitter Profile Photo

Unveil the game-changing tools of ethical hacking in 2025! Get ready to master advanced penetration testing, wireless traffic analysis, and more with the Flipper Zero 2.0 and Bash Bunny Mark II. #BugBounty #cybersecuritytips medium.com/@verylazytech/…

Bug Bounty Shorts (@bugbountyshorts) 's Twitter Profile Photo

Boost your bug bounty game by learning how to harness the power of FFUF - a top open-source tool for discovering hidden web server assets! This ultimate guide will walk you through using FFUF's commands, #Fuzzing #bugbountytips tinyurl.com/mr39fk6z

Bug Bounty Shorts (@bugbountyshorts) 's Twitter Profile Photo

Discover a potential DoS vulnerability in Django's IPv6 validation! By exploiting excessive resource consumption caused by large, malformed strings in clean_ipv6_address and is_valid_ipv6_address functions, you could bring systems to a halt. hackerone.com/reports/2939077

Bug Bounty Shorts (@bugbountyshorts) 's Twitter Profile Photo

The article discusses a non-technical vulnerability in the bug bounty process, often referred to as 'Overreporting'. Overeager newcomers might report every potential issue they find, regardless of its severity or exploitability. medium.com/@thedevtaskoff…

Ole Lehmann (@itsolelehmann) 's Twitter Profile Photo

Everyone says Europe can't compete with America in tech. But 48 hours ago, Mistral's 'Le Chat' just proved them wrong: • 13x faster than ChatGPT • 100% open-source • Completely free (vs $20/month) The European AI breakthrough Silicon Valley didn't see coming 🧵:

Everyone says Europe can't compete with America in tech.

But 48 hours ago, Mistral's 'Le Chat' just proved them wrong:

• 13x faster than ChatGPT
• 100% open-source
• Completely free (vs $20/month)

The European AI breakthrough Silicon Valley didn't see coming 🧵:
Bug Bounty Shorts (@bugbountyshorts) 's Twitter Profile Photo

Discover a hidden stored Cross-Site Scripting (XSS) vulnerability in an onclick event attribute! Learn to bypass HTML encoding for angle brackets, double quotes, single quotes, and backslashes. #BugHunting #Cybersecurity tinyurl.com/22zrw7lh 1/1

r1ru (@ri5255) 's Twitter Profile Photo

I've released a blog series about modern Linux kernel exploitation, where you can learn some advanced techniques used in real-world kernel exploits. Enjoy! r1ru.github.io/categories/lin…

I've released a blog series about modern Linux kernel exploitation, where you can learn some advanced techniques used in real-world kernel exploits. Enjoy!

r1ru.github.io/categories/lin…
Jorian (@j0r1an) 's Twitter Profile Photo

Double-Clickjacking, or "press buttons on other sites without preconditions". After seeing and experimenting with this technique for a while, I cooked up a variation that combines many small tricks and ends up being quite convincing. Here's a flexible PoC: jorianwoltjer.com/blog/p/hacking…

Jeff Boudier 🤗 (@jeffboudier) 's Twitter Profile Photo

🥁 Today we announce a new collaboration with NVIDIA to connect AI Researchers with GPU Clusters! 🤝 Introducing Training Cluster as a Service, powered by the new NVIDIA DGX Cloud Lepton. We hope this new service will help bridge the compute gap between the GPU rich and the

🥁 Today we announce a new collaboration with <a href="/nvidia/">NVIDIA</a> to connect AI Researchers with GPU Clusters! 🤝

Introducing  Training Cluster as a Service, powered by the new NVIDIA DGX Cloud  Lepton. We hope this new service will help bridge the compute gap  between the GPU rich and the
s1r1us (@s1r1u5_) 's Twitter Profile Photo

Hacking Windsurf: I asked the AI for the shell, it said yes. new video’s out. I show how I could’ve hacked you… just by getting you to click my link. Link posted below.

Hacking Windsurf: I asked the AI for the shell, it said yes.

new video’s out. I show how I could’ve hacked you… just by getting you to click my link.

Link posted below.
PT SWARM (@ptswarm) 's Twitter Profile Photo

🦊 Mozilla Foundation fixed CVE-2025-6430, discovered by our researcher Daniil Satyaev! This vulnerability allows the Content-Disposition: attachment header to be ignored if the page is opened using <embed> or <object>, resulting in files being displayed instead of downloaded.

🦊 Mozilla Foundation fixed CVE-2025-6430, discovered by our researcher Daniil Satyaev!

This vulnerability allows the Content-Disposition: attachment header to be ignored if the page is opened using &lt;embed&gt; or &lt;object&gt;, resulting in files being displayed instead of downloaded.
Nagli (@galnagli) 's Twitter Profile Photo

I hacked a popular vibe coding platform with a simple, straight-forward logic flaw - allowing access to private applications . Here’s how I did it 🧵

I hacked a popular vibe coding platform with a simple, straight-forward logic flaw - allowing access to private applications . Here’s how I did it 🧵