sunny‏‏‎ (@hulkvision) 's Twitter Profile
sunny‏‏‎

@hulkvision

Learning android hacking | bug hunter |

ID: 844198878568243200

linkhttps://hulkvision.github.io calendar_today21-03-2017 14:47:51

68 Tweet

880 Followers

291 Following

Intigriti (@intigriti) 's Twitter Profile Photo

The Visma live hacking event is coming to an end and you are invited to join the award ceremony 🎉 Make sure to tune in today at 1pm (CET) during #VismaSecCon! Sign up over here 👉 visma-seccon.github.io See you there! #HackWithIntigriti #1337up1121 Mother of Hackers

The <a href="/visma/">Visma</a> live hacking event is coming to an end and you are invited to join the award ceremony 🎉

Make sure to tune in today at 1pm (CET) during #VismaSecCon! Sign up over here 👉 visma-seccon.github.io

See you there! 

#HackWithIntigriti #1337up1121 <a href="/HackersMother/">Mother of Hackers</a>
Aditya Soni (@hetroublehacker) 's Twitter Profile Photo

I have published my Blog on "How I approached Dependency Confusion!" Hope you people will like it :) #bugbounty #infosec link.medium.com/Nnh2RqGRgnb

Jack Halon (@jack_halon) 's Twitter Profile Photo

Today I am finally releasing a new 3-part browser exploitation series on Chrome! This was written to help beginners break into the browser exploitation field. Part 1 covers V8 internals such as objects, properties, and memory optimizations. Enjoy! jhalon.github.io/chrome-browser…

d3d aka dead (dead, мёртв, 死了) (@deadvolvo) 's Twitter Profile Photo

#0day #research #bugbounty #informationsecurity blog.malicious.group/from-akamai-to… How I *AM* able to abuse Akamai to abuse F5, to abuse all of their customers. This is a bug chain that doesn't require a bug on the target domain to exploit them. But what do I know, I am a freelance nobody.

sunny‏‏‎ (@hulkvision) 's Twitter Profile Photo

Started my smart contract auditing journey after completing the Cyfrin Updraft 🟩 course with AI ARENA | ʌı Code4rena contest. Reported 3 high severity bugs, waiting for the contest results to see how i performed.

Jinay Patel (@0_0eth0) 's Twitter Profile Photo

Conducted IoMT PT on one of the large manufacturers of different medical devices, critical flaw leads to access their azure! Here is how: TL;DR Frontend application was running on kiosk mode, backend was win with restrictions such as application control, where you cant, [1/n]

sunny‏‏‎ (@hulkvision) 's Twitter Profile Photo

Exploiting JavaScript Interface for Unauthorized Access in a 'global' cryptocurrency exchange android app hulkvision.github.io/blog/javascrip… #infosec #androidapp

Debangshu 🇮🇳🥷 (@thisisdk999) 's Twitter Profile Photo

x.com/ThisIsDK999/st… Here's the thread on how to achieve RCE via GroovyConsole in AEM even with a heavy dispatcher configuration!