Ankit saini (@d3afh3av3n) 's Twitter Profile
Ankit saini

@d3afh3av3n

Security Engineer @Tekion |Ex-Blinkit |DevSecOps |Python | Automation |Learner

ID: 801770489848872960

calendar_today24-11-2016 12:52:35

167 Tweet

169 Followers

760 Following

Ankit saini (@d3afh3av3n) 's Twitter Profile Photo

The slack token is getting leaked which eventually use to hack organizations because we all have a bad habit of sharing credentials in plain text, but It can be avoided here is my blog explaining how? medium.com/@ankitsaini260… #slack #cybersecurity

X (@themsterdoctor1) 's Twitter Profile Photo

autoSSRF (Automatic SSRF Testing) - Smart fuzzing on relevant SSRF GET parameters and Context-based dynamic payload generation - Repo: github.com/Th0h0/autossrf - Creator: Thomas Houhou - - #CyberSecurity #bugbountytips #infosec #CTF #tools

autoSSRF (Automatic SSRF Testing)
-
Smart fuzzing on relevant SSRF GET parameters and Context-based dynamic payload generation
-
Repo: github.com/Th0h0/autossrf
-
Creator: <a href="/Th0h0/">Thomas Houhou</a> 
-
-
#CyberSecurity #bugbountytips #infosec #CTF #tools
Yasser | Skidrow 🇸🇦 (@firfox20) 's Twitter Profile Photo

drive.google.com/file/d/1YfEk9L… # Single Liners to Sub_Enum live_Subs from crt.sh and save it to file , Scan Ports , DirFuzzing, XSS Hunting # Good Luck and Hack Ethically : ) #bugbountytips 'Skidrow🕷️'

drive.google.com/file/d/1YfEk9L…

# Single Liners to Sub_Enum live_Subs from crt.sh and save it to file , Scan Ports , DirFuzzing, XSS Hunting 
# Good Luck and Hack Ethically : ) 
#bugbountytips 
'Skidrow🕷️'
X (@themsterdoctor1) 's Twitter Profile Photo

Best SSRF Bypass List (2022) - Copy ALL headers and paste in your request. - List: pastebin.com/YbsKrMpf - - #cybersecuritytips #CyberSecurity #CTF #bugbounty #bugbountytips

Best SSRF Bypass List (2022)
-
Copy ALL headers and paste in your request.
-
List: pastebin.com/YbsKrMpf
-
-
#cybersecuritytips #CyberSecurity #CTF #bugbounty #bugbountytips
BlackWasp (@blwasp_) 's Twitter Profile Photo

I'v recently updated my Active Directory cheatsheets. I'v added attacks regarding krbjack, GPOditty, SCCM, RODC pivoting, External Trust non-transitivity bypass, DES attacks, and others. If interested : - AD : hideandsec.sh/books/cheatshe… - AD Python : hideandsec.sh/books/cheatshe…

Ankit saini (@d3afh3av3n) 's Twitter Profile Photo

I wrote my first flash blog on integrating Amazon GuardDuty alerts with Microsoft Teams for enhanced security response and ISO 27001 compliance. Let me know your ideas for the next DevSecOps topic! 🔐💡 #DevSecOps #Security #AWS #ISO27001" medium.com/@ankitsaini260…

Bounty Security (@bountysecurity) 's Twitter Profile Photo

🎉BLACK FRIDAY🎉 🎁Like every year, the Burp Bounty Pro offer arrives from now until next Cyber monday, the annual license has been reduced from €79/year to €59/year VAT included. For buy it:👉 burpbounty.net

Alamin (@iam_chonchol) 's Twitter Profile Photo

Hacking devices are so Powerful. These Hacking tools Can Destroy Your Digital Life. ( Protect yourself NOW! ) 1. USB Nugget A versatile hacking tool disguised as a harmless USB drive, capable of infiltrating and compromising target systems with ease.

Hacking devices are so Powerful.

These Hacking tools Can Destroy Your Digital Life.

( Protect yourself NOW! )

1. USB Nugget

A versatile hacking tool disguised as a harmless USB drive, capable of infiltrating and compromising target systems with ease.
Ankit saini (@d3afh3av3n) 's Twitter Profile Photo

🔐 “Slack + AWS = Zero standing privileges. Built a bot that automates: 🚀 1-click role requests ✅ Approval workflows ⏳ Auto-expiring credentials No more ‘always-on’ IAM risks. medium.com/p/slack-aws-se… #CloudSecurity #AWS #DevSecOps

Ankit saini (@d3afh3av3n) 's Twitter Profile Photo

"Nobody reads the docs" — we've all heard it. I tackled this challenge using LLMs to make documentation useful. Check out my latest blog on solving this long-standing problem with practical, AI-powered solutions. 🔗 medium.com/@ankitsaini260…

Ankit saini (@d3afh3av3n) 's Twitter Profile Photo

🔥 Tired of manual STRIDE threat modeling? I automated it with Python + AI: ✅ Threat analysis in seconds ✅ Full STRIDE coverage ✅ 80% faster How it works + results: medium.com/@ankitsaini260… #CyberSecurity #AI #ThreatModeling

Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Cloud Security Framework Cheat Sheet 🔴⚫️Full HD Image: github.com/Ignitetechnolo… 🔥 Telegram: t.me/hackinarticles #CyberSecurity #InfoSec #CyberAwareness #CyberThreats #DataSecurity #informationsecurity #ITSecurity #CyberSecurityTraining #EthicalHacking #BlueTeam #RedTeam

Cloud Security Framework Cheat Sheet

🔴⚫️Full HD Image: github.com/Ignitetechnolo…

🔥 Telegram: t.me/hackinarticles

#CyberSecurity #InfoSec #CyberAwareness #CyberThreats #DataSecurity #informationsecurity #ITSecurity #CyberSecurityTraining #EthicalHacking #BlueTeam #RedTeam
Intigriti (@intigriti) 's Twitter Profile Photo

Hakoriginfinder by Luke Stephens (hakluke) is a simple tool to quickly identify the origin hosts of targets behind firewalls, CDNs, and other types of reverse proxies! 🤠 🔗 github.com/hakluke/hakori…

Hakoriginfinder by <a href="/hakluke/">Luke Stephens (hakluke)</a> is a simple tool to quickly identify the origin hosts of targets behind firewalls, CDNs, and other types of reverse proxies! 🤠 

🔗 github.com/hakluke/hakori…
Clandestine (@akaclandestine) 's Twitter Profile Photo

GitHub - gommzystudio/device-activity-tracker: A phone number can reveal whether a device is active, in standby or offline (and more). This PoC demonstrates how delivery receipts + RTT timing leak sensitive device-activity patterns. (WhatsApp / Signal) github.com/gommzystudio/d…

Nicolas Krassas (@dinosn) 's Twitter Profile Photo

Claude Code skill for AI-assisted bug bounty hunting - recon, IDOR, XSS, SSRF, OAuth, GraphQL, LLM injection, and report generation github.com/shuvonsec/clau…