Viren Pawar (@virenpawar_) 's Twitter Profile
Viren Pawar

@virenpawar_

bio loading ...

ID: 1028339398742487040

calendar_today11-08-2018 17:56:33

810 Tweet

835 Takipçi

524 Takip Edilen

Viren Pawar (@virenpawar_) 's Twitter Profile Photo

wanting to create automation workflow that imitate my penetration testing checklist - looking out for open-source solution and am considering n8n-io as of now. feel free to share if you know any other/better automation workflow tool

Synack Red Team (@synackredteam) 's Twitter Profile Photo

Oftentimes, resiliency pays off. Kuldeep Pandya shares his strategy for discovering a second order XXE. Read more about his thought process in this Exploits Explained → hubs.ly/Q01V-Kwc0

Viren Pawar (@virenpawar_) 's Twitter Profile Photo

I’m thankful to Synack Red Team for having me on their platform and for helping me upgrading my skills. Long engagements and a slow pace definitely yields positive results. Don’t give up. #infosec #bugbounty #srt #exploitsexplained #writeup

Viren Pawar (@virenpawar_) 's Twitter Profile Photo

Just read my brother - Smilehacker ‘s latest blog on access control! 🛡️ He shares two real-world experiences of exploiting cases. Essential read for those in #InfoSec, #CyberSecurity, and #BugBounty. Don't miss out! 🔐 #ethicalhacking #cobalt cobalt.io/blog/introduct…

Viren Pawar (@virenpawar_) 's Twitter Profile Photo

I just completed the "Dojo #31 - Coffee shop" challenge on @YesWeHack! 🚀 This one is amazing and time-demanding challenge! Just a hint: You do not need that much coffee! Can you do it?: dojo-yeswehack.com/challenge/play… #ChallengeCompleted #YesWeRHackers #YesWeHackDojo

Viren Pawar (@virenpawar_) 's Twitter Profile Photo

I just completed the "Dojo #32 - Security Panel" challenge on YesWeHack ⠵! 🚀 This challenge taught me something surprisingly new about Python. Respect++ to Nishacid. Link to the challenge: dojo-yeswehack.com/challenge/play… #ChallengeCompleted #YesWeRHackers #YesWeHackDojo

Viren Pawar (@virenpawar_) 's Twitter Profile Photo

Do checkout the recent blog from Sudarshana. We have demonstrated real-world scenario of achieving an RCE from Git Disclosure in CTF style! Bonus: AI mistakes, common tips, and complete timeline are also included within. #BugBounty #Sudarshana #ApplicationSecurity

Viren Pawar (@virenpawar_) 's Twitter Profile Photo

Marketing’s under so much pressure, they managed to turn a simple insight vulnerability into a theme park attraction. 🤭 Do check other comments on this post.

Jenish Sojitra (@_jensec) 's Twitter Profile Photo

Sharing my Burp Extension that earned me $200k in 2025 while API testing heavy JS-rich targets. github.com/jenish-sojitra… The tool helps find endpoints, files, internal emails, and some secrets from minified JS. Its goal is to achieve maximum efficiency with reduced noise in

Sharing my Burp Extension that earned me $200k in 2025 while API testing heavy JS-rich targets.

github.com/jenish-sojitra…

The tool helps find endpoints, files, internal emails, and some secrets from minified JS. 

Its goal is to achieve maximum efficiency with reduced noise in