Pethuraj M (@pethuraj) 's Twitter Profile
Pethuraj M

@pethuraj

Cyber Security Specialist | eWPTXv2 | Security Researcher ๐Ÿ‘๏ธโƒค ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป Connect with me on LinkedIn: linkedin.com/in/pethu/

ID: 147175291

linkhttps://www.pethuraj.com calendar_today23-05-2010 12:05:43

1,1K Tweet

4,4K Followers

207 Following

Pethuraj M (@pethuraj) 's Twitter Profile Photo

โšก Pentesters & CTF players - Need to pentest APIs, replay requests, or tweak headers on the fly? ๐Ÿš€ Try hoppscotch.io - a fast, browser-based alternative to Postman. Perfect for recon, bug bounty, and on-the-go API pentesting. #Cybersecurity #Pentest #BugBounty

Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐Ÿงจ๐๐ž๐ซ๐ข๐จ๐๐ข๐œ ๐“๐š๐›๐ฅ๐ž ๐จ๐Ÿ ๐Ž๐Ÿ๐Ÿ๐ž๐ง๐ฌ๐ข๐ฏ๐ž ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐Ÿ”—github.com/Straw-Hat-Hackโ€ฆ #CyberSecurity #OffensiveSecurity

๐Ÿงจ๐๐ž๐ซ๐ข๐จ๐๐ข๐œ ๐“๐š๐›๐ฅ๐ž ๐จ๐Ÿ ๐Ž๐Ÿ๐Ÿ๐ž๐ง๐ฌ๐ข๐ฏ๐ž ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ
๐Ÿ”—github.com/Straw-Hat-Hackโ€ฆ

#CyberSecurity #OffensiveSecurity
Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐Ÿšจ ๐€๐ˆ ๐‘๐ž๐ ๐“๐ž๐š๐ฆ๐ข๐ง๐  ๐๐ฅ๐š๐ฒ๐ ๐ซ๐จ๐ฎ๐ง๐ ๐‹๐š๐›๐ฌ ๐›๐ฒ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ Red teamers and AI/ML security folks - Microsoft just dropped an open-source toolkit for hands-on AI security testing. ๐Ÿ”— github.com/microsoft/AI-Rโ€ฆ #AI #RedTeam #CyberSecurity

๐Ÿšจ ๐€๐ˆ ๐‘๐ž๐ ๐“๐ž๐š๐ฆ๐ข๐ง๐  ๐๐ฅ๐š๐ฒ๐ ๐ซ๐จ๐ฎ๐ง๐ ๐‹๐š๐›๐ฌ ๐›๐ฒ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ

Red teamers and AI/ML security folks - Microsoft just dropped an open-source toolkit for hands-on AI security testing.
๐Ÿ”— github.com/microsoft/AI-Rโ€ฆ

#AI #RedTeam #CyberSecurity
Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐Ÿ›ก๏ธ ๐—ช๐—ฎ๐˜‡๐˜‚๐—ต ๐—–๐—ง๐—œ (๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—œ๐—ป๐˜๐—ฒ๐—น๐—น๐—ถ๐—ด๐—ฒ๐—ป๐—ฐ๐—ฒ) ๐Ÿ”—cti.wazuh.com/vulnerabilitieโ€ฆ Security researchers & Threat Intel pros: Discover Wazuhโ€™s new open-source CTI Vulnerability Explorer. #ThreatIntelligence #CyberSecurity #Wazuh

Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐Ÿ“Œ ๐๐ž๐ง๐ญ๐ž๐ฌ๐ญ ๐“๐ข๐ฉ The ๐—ข๐—ช๐—”๐—ฆ๐—ฃ ๐—ฅ๐—ถ๐˜€๐—ธ ๐—”๐˜€๐˜€๐—ฒ๐˜€๐˜€๐—บ๐—ฒ๐—ป๐˜ ๐—–๐—ฎ๐—น๐—ฐ๐˜‚๐—น๐—ฎ๐˜๐—ผ๐—ฟ is a great way to practice mapping threats to business impact and likelihood - a skill every security pro needs. ๐Ÿ”— javierolmedo.github.io/OWASP-Calculatโ€ฆ #CyberSecurity #Infosec

๐Ÿ“Œ ๐๐ž๐ง๐ญ๐ž๐ฌ๐ญ ๐“๐ข๐ฉ
The ๐—ข๐—ช๐—”๐—ฆ๐—ฃ ๐—ฅ๐—ถ๐˜€๐—ธ ๐—”๐˜€๐˜€๐—ฒ๐˜€๐˜€๐—บ๐—ฒ๐—ป๐˜ ๐—–๐—ฎ๐—น๐—ฐ๐˜‚๐—น๐—ฎ๐˜๐—ผ๐—ฟ is a great way to practice mapping threats to business impact and likelihood - a skill every security pro needs.
๐Ÿ”— javierolmedo.github.io/OWASP-Calculatโ€ฆ

#CyberSecurity #Infosec
Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐ŸŒ€ ๐—ฆ๐—บ๐˜‚๐—ด๐—ด๐—น๐—ฒ๐—™๐˜‚๐˜‡๐˜‡ - A modular HTTP request smuggling fuzzer built for deep desync exploration. ๐Ÿ‘‰ github.com/moopinger/smugโ€ฆ Perfect for testing reverse proxies, finding obscure smuggling vectors, and pushing fuzzing boundaries. #CyberSecurity #RedTeam #BugBounty

๐ŸŒ€ ๐—ฆ๐—บ๐˜‚๐—ด๐—ด๐—น๐—ฒ๐—™๐˜‚๐˜‡๐˜‡ - A modular HTTP request smuggling fuzzer built for deep desync exploration.
๐Ÿ‘‰ github.com/moopinger/smugโ€ฆ

Perfect for testing reverse proxies, finding obscure smuggling vectors, and pushing fuzzing boundaries.

#CyberSecurity #RedTeam #BugBounty
Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐Ÿง ๐Ÿ” ๐—ฉ๐—ฃ๐—ž - ๐—”๐—œ-๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ๐—ฒ๐—ฑ ๐—ฃ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ ๐—–๐—ฟ๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด A web-based platform that leverages Vast.ai GPU instances for authorized password cracking using Hashcat. ๐Ÿ”— github.com/d-sec-net/VPK #CyberSecurity #RedTeam #Pentest

๐Ÿง ๐Ÿ” ๐—ฉ๐—ฃ๐—ž - ๐—”๐—œ-๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ๐—ฒ๐—ฑ ๐—ฃ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ ๐—–๐—ฟ๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด
A web-based platform that leverages Vast.ai GPU instances for authorized password cracking using Hashcat.

๐Ÿ”— github.com/d-sec-net/VPK

#CyberSecurity #RedTeam #Pentest
Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐“๐ข๐ง๐ฒ ๐—๐’๐’ ๐๐š๐ฒ๐ฅ๐จ๐š๐๐ฌ ๐ŸŒต A compact and creative collection of short XSS payloads - great for firewall evasion, bypassing misconfigured CSPs, and testing edge cases in web security. ๐Ÿ”— Check it out: tinyxss.terjanq.me #CyberSecurity #Pentest #bugbounty #XSS

Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐Ÿšจ ๐—ก๐—ฒ๐—ฒ๐—ฑ ๐˜๐—ผ ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—š๐—ถ๐˜๐—›๐˜‚๐—ฏ ๐˜€๐—บ๐—ฎ๐—ฟ๐˜๐—ฒ๐—ฟ? Meet GitSearchAI.com Search GitHub using naturel language. #CyberSecurity

๐Ÿšจ ๐—ก๐—ฒ๐—ฒ๐—ฑ ๐˜๐—ผ ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—š๐—ถ๐˜๐—›๐˜‚๐—ฏ ๐˜€๐—บ๐—ฎ๐—ฟ๐˜๐—ฒ๐—ฟ? Meet GitSearchAI.com
Search GitHub using naturel language.

#CyberSecurity
Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐Ÿงช ๐๐ž๐ง๐ญ๐ž๐ฌ๐ญ๐ž๐ซ๐ฌ, ๐๐ž๐ฐ ๐“๐จ๐จ๐ฅ ๐€๐ฅ๐ž๐ซ๐ญ: ๐‚๐š๐ข๐๐จ ๐„๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ ๐†๐ž๐ง๐ž๐ซ๐š๐ญ๐จ๐ซ ๐๐ฅ๐ฎ๐ ๐ข๐ง Transform intercepted requests into ready-to-use exploit scripts, instantly. ๐Ÿ”— Try it now: github.com/stealthcopter/โ€ฆ #CyberSecurity

๐Ÿงช ๐๐ž๐ง๐ญ๐ž๐ฌ๐ญ๐ž๐ซ๐ฌ, ๐๐ž๐ฐ ๐“๐จ๐จ๐ฅ ๐€๐ฅ๐ž๐ซ๐ญ: ๐‚๐š๐ข๐๐จ ๐„๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ ๐†๐ž๐ง๐ž๐ซ๐š๐ญ๐จ๐ซ ๐๐ฅ๐ฎ๐ ๐ข๐ง

Transform intercepted requests into ready-to-use exploit scripts, instantly.
๐Ÿ”— Try it now: github.com/stealthcopter/โ€ฆ

#CyberSecurity
Pethuraj M (@pethuraj) 's Twitter Profile Photo

Whatโ€™s a pentesterโ€™s worst nightmare? โ€ƒโ€œAll findings are false positives.โ€ ๐Ÿ˜ฑ๐Ÿ“‰ #CyberSecurity

Pethuraj M (@pethuraj) 's Twitter Profile Photo

LMAP (large language model mapper) is like NMAP for LLM, is a Out-of-Box Large Language Model (LLM) Evaluation Tool, designed to integrate Benchmarking, Redteaming, Jailbreak Fuzzing and Adversarial Prompt Fuzzing. github.com/TrustAI-laboraโ€ฆ #Cybersecurity #Redteam #LLM

LMAP (large language model mapper) is like NMAP for LLM, is a Out-of-Box Large Language Model (LLM) Evaluation Tool, designed to integrate Benchmarking, Redteaming, Jailbreak Fuzzing and Adversarial Prompt Fuzzing.
github.com/TrustAI-laboraโ€ฆ

#Cybersecurity #Redteam #LLM
Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐€๐ฅ๐ฉ๐ก๐š๐›๐ž๐ญ๐Ÿ๐ฎ๐ฌ๐œ๐š๐ญ๐ข๐จ๐ง - Convert your shellcode into an ASCII string ๐Ÿ”—github.com/Maldev-Academyโ€ฆ

๐€๐ฅ๐ฉ๐ก๐š๐›๐ž๐ญ๐Ÿ๐ฎ๐ฌ๐œ๐š๐ญ๐ข๐จ๐ง - Convert your shellcode into an ASCII string
๐Ÿ”—github.com/Maldev-Academyโ€ฆ
Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐—ง๐—ฒ๐˜€๐˜ ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—”๐—œ ๐—›๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ๐—ฆ๐—ธ๐—ถ๐—น๐—น๐˜€ ๐˜„๐—ถ๐˜๐—ต ๐—๐—ฎ๐—ถ๐—น๐—ฏ๐—ฟ๐—ฒ๐—ฎ๐—ธ๐— ๐—ฒ jailbreakme.xyz is an open-source decentralized app where users are challenged to jailbreak existing LLMs and uncover weaknesses with rewards for successful attempts. ๐Ÿ† #CyberSecurity

๐—ง๐—ฒ๐˜€๐˜ ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—”๐—œ ๐—›๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ๐—ฆ๐—ธ๐—ถ๐—น๐—น๐˜€ ๐˜„๐—ถ๐˜๐—ต ๐—๐—ฎ๐—ถ๐—น๐—ฏ๐—ฟ๐—ฒ๐—ฎ๐—ธ๐— ๐—ฒ

jailbreakme.xyz is an open-source decentralized app where users are challenged to jailbreak existing LLMs and uncover weaknesses with rewards for successful attempts. ๐Ÿ†

#CyberSecurity
Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐Ÿ” ๐—ฅ๐—ฒ๐—ฝ๐—ฒ๐—ฎ๐˜๐—ฒ๐—ฟ ๐—ฆ๐˜๐—ฟ๐—ถ๐—ธ๐—ฒ - Replay the same request with multiple payloads, faster & smarter An AI-powered #BurpSuite extension that turns your Repeater traffic into scan checks, bridging gap between manual testing & automation ๐Ÿ”— github.com/hackvertor/repโ€ฆ #CyberSecurity

Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐Ÿ”ด ๐——๐—ฒ๐—ฒ๐—ฝ๐—ง๐—ฒ๐—ฎ๐—บ โ€“ ๐—ง๐—ต๐—ฒ ๐—Ÿ๐—Ÿ๐—  ๐—ฅ๐—ฒ๐—ฑ ๐—ง๐—ฒ๐—ฎ๐—บ๐—ถ๐—ป๐—ด ๐—™๐—ฟ๐—ฎ๐—บ๐—ฒ๐˜„๐—ผ๐—ฟ๐—ธ ๐—ณ๐—ผ๐—ฟ ๐—ฅ๐—ฒ๐—ฑ ๐—ง๐—ฒ๐—ฎ๐—บ๐—ฒ๐—ฟ๐˜€, ๐—ข๐—ณ๐—ณ๐—ฒ๐—ป๐˜€๐—ถ๐˜ƒ๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต๐—ฒ๐—ฟ๐˜€ & ๐—ฃ๐—ฒ๐—ป๐˜๐—ฒ๐˜€๐˜๐—ฒ๐—ฟ๐˜€ ๐Ÿ”— github.com/confident-ai/dโ€ฆ #LLMSecurity #RedTeam #CyberSecurity

๐Ÿ”ด ๐——๐—ฒ๐—ฒ๐—ฝ๐—ง๐—ฒ๐—ฎ๐—บ โ€“ ๐—ง๐—ต๐—ฒ ๐—Ÿ๐—Ÿ๐—  ๐—ฅ๐—ฒ๐—ฑ ๐—ง๐—ฒ๐—ฎ๐—บ๐—ถ๐—ป๐—ด ๐—™๐—ฟ๐—ฎ๐—บ๐—ฒ๐˜„๐—ผ๐—ฟ๐—ธ ๐—ณ๐—ผ๐—ฟ ๐—ฅ๐—ฒ๐—ฑ ๐—ง๐—ฒ๐—ฎ๐—บ๐—ฒ๐—ฟ๐˜€, ๐—ข๐—ณ๐—ณ๐—ฒ๐—ป๐˜€๐—ถ๐˜ƒ๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต๐—ฒ๐—ฟ๐˜€ & ๐—ฃ๐—ฒ๐—ป๐˜๐—ฒ๐˜€๐˜๐—ฒ๐—ฟ๐˜€
๐Ÿ”— github.com/confident-ai/dโ€ฆ

#LLMSecurity #RedTeam #CyberSecurity
Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐Ÿ•ต๏ธโ€โ™‚๏ธ Came across ๐—”๐—œ๐—ฆ๐—”-๐—ฆ๐—ฐ๐—ฎ๐—ป๐—ป๐—ฒ๐—ฟ - an AI/ML-driven cybersecurity analysis toolkit. Worth exploring if you're building tools for proactive threat detection or automated security workflows. ๐Ÿ”— github.com/haroonawanoffiโ€ฆ #CyberSecurity

Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐Ÿ“Œ ๐๐ž๐ง๐ญ๐ž๐ฌ๐ญ ๐“๐ข๐ฉ If you want to find API authorization flaws easily, try using ๐—”๐˜‚๐˜๐—ผ๐˜€๐˜„๐—ฎ๐—ด๐—ด๐—ฒ๐—ฟ. It extracts & categorizes endpoints from OpenAPI specs to accelerate auth testing and attack surface mapping. ๐Ÿ”— github.com/intruder-io/auโ€ฆ #Cybersecurity #bugbountytips

๐Ÿ“Œ ๐๐ž๐ง๐ญ๐ž๐ฌ๐ญ ๐“๐ข๐ฉ

If you want to find API authorization flaws easily, try using ๐—”๐˜‚๐˜๐—ผ๐˜€๐˜„๐—ฎ๐—ด๐—ด๐—ฒ๐—ฟ.
It extracts & categorizes endpoints from OpenAPI specs to accelerate auth testing and attack surface mapping.
๐Ÿ”— github.com/intruder-io/auโ€ฆ

#Cybersecurity #bugbountytips