${Manash} //xplo1t (@manash036) 's Twitter Profile
${Manash} //xplo1t

@manash036

Product Security Engineer | i hack things | Whitehat | AppSec and Bug Bounties 🐞

ID: 713737807529783297

linkhttps://xplo1t-sec.github.io/ calendar_today26-03-2016 14:42:08

2,2K Tweet

2,2K Followers

1,1K Following

Jason Haddix (@jhaddix) 's Twitter Profile Photo

⚠️ Giveaway ⚠️ Want to learn modern reconnaissance and hacking skills? Join The Bug Hunter's Methodology Cohort 5! October 2nd, 3rd, 4th - jhaddix.gumroad.com/l/kihwd Like and retweet this post for a chance to win a free seat! Five winners will be announced on Sept 1st!

sw33tLie (@sw33tlie) 's Twitter Profile Photo

This is one of the most widespread and impactful bugs I've ever found in my career. Great collab with bsysop and Medusa Smugglings are still out there—stay vigilant! #bugbounty bugcrowd bugcrowd.com/blog/unveiling…

This is one of the most widespread and impactful bugs I've ever found in my career. Great collab with <a href="/bsysop/">bsysop</a> and <a href="/_medusa_1_/">Medusa</a> 

Smugglings are still out there—stay vigilant! #bugbounty <a href="/Bugcrowd/">bugcrowd</a>

bugcrowd.com/blog/unveiling…
${Manash} //xplo1t (@manash036) 's Twitter Profile Photo

Hi IndiGo , I am unable to reschedule my cancelled flight on your Plan B website at goindigo.in/plan-b/flight-…. Any help would be appreciated

@baybedoll@infosec.exchange (@baybe_doll) 's Twitter Profile Photo

Unlocking my hotel room door with my fingernails! New #defconnails for #defcon inspired by Jon Buckley's "High Tech Monopoly" with 2x hidden Mifare Classic magic chips and 2x NTAG+LED nail stickers that I designed. I used @flipper_zero to clone my room key to the Mifare chip!

James Kettle (@albinowax) 's Twitter Profile Photo

The whitepaper is live! Listen to the whispers: web timing attacks that actually work. Read it here -> portswigger.net/research/liste…

Burp Suite (@burp_suite) 's Twitter Profile Photo

Introducing Burp Suite's latest performance upgrades ⚡ We've listened to your feedback and made our core tools faster, more efficient, and use less memory. Here's a glimpse of what's new. 🧵👇 #BurpSuitePerformance

Introducing Burp Suite's latest performance upgrades ⚡

We've listened to your feedback and made our core tools faster, more efficient, and use less memory. 

Here's a glimpse of what's new. 🧵👇 #BurpSuitePerformance
Oste (@oste_ke) 's Twitter Profile Photo

Any good Universities you can recommend to someone who wants to advance their Computer Science / Cybersecurity Masters Degree in the US/Canada/Europe? Please help repost to reach a larger audience 😌🙏 Asking for a friend :)

Sandipan Roy (@bytehackr) 's Twitter Profile Photo

Boost your API security skills with DVAPI! 🚀 Learn hands-on with OWASP API Top 10 - 2023 to spot and fix common vulnerabilities.🔍 Ref: blog.bytehackr.in/api-security-t… Payatu DVAPI 👨‍💻 #APISecurity #DVAPI #OWASP #CyberSecurity #API #EthicalHacking #SecureCoding #DevSecOps

Blaklis (@blaklis_) 's Twitter Profile Photo

The record of my talk at DEFCON is finally out! Go check media.defcon.org/DEF%20CON%2032… to see a few surprising bugs I found in my bug bounty career :p #bugbounty

Akshat Gupta 🇮🇳 (@hellfire0x01) 's Twitter Profile Photo

Hi guys, I am actively looking for a new role in the domain DFIR, Threat Hunting, Threat Intelligence, Detection Engineer. I do: - proactive & reactive TH - adversary emulation - detection rule creation - CTI Analysis - forensics - threat analysis Thanks!

Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

🚨New giveaway alert🚨 We are giving away some vouchers for OffSec * 1x PEN-200 Course and Cert exam bundle (OSCP) * 1x Learn Fundamentals Subscription * 1x Annual PG Practice access Read the full post to learn How to participate: 1⃣Subscribe to our youtube channel

slonser (@slonser_) 's Twitter Profile Photo

Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

Today I used a technique that’s probably not widely known in the community.
In what cases could code like this lead to a vulnerability? -&gt;
Security BSides Ahmedabad (@bsidesahmedabad) 's Twitter Profile Photo

🚨 OSCP GIVEAWAY ALERT🚨 We’re giving away 3 OSCP vouchers to supercharge your pentesting journey – proudly sponsored by OffSec ! 💥🙌 To enter: 1.✅ Follow Us 2.🔁 Retweet this post 3.❤️ Like this post 4.💬 Reply with your funniest cybersecurity meme 🎯 We’ll pick 3

🚨 OSCP GIVEAWAY ALERT🚨

We’re giving away 3 OSCP vouchers to supercharge your pentesting journey – proudly sponsored by <a href="/offsectraining/">OffSec</a> ! 💥🙌

To enter:
1.✅ Follow Us
2.🔁 Retweet this post
3.❤️ Like this post
4.💬 Reply with your funniest cybersecurity meme

🎯 We’ll pick 3
Arshad Kazmi (@arshadkazmi42) 's Twitter Profile Photo

🚀 Giveaway time! 🚀 We’re giving away 3-week access plans to iScan.today 🔍 To enter: ✅ Follow me ✅ Like & RT this tweet ✅ Comment "iScan.today" Winners will be announced in 24 hours 🎉

${Manash} //xplo1t (@manash036) 's Twitter Profile Photo

I found a vulnerability in Gemini CLI that allowed execution of arbitrary commands even if it was blacklisted by the user. I wrote about it in my latest blog: xplo1t-sec.github.io/posts/exploiti… Thanks to Google VRP (Google Bug Hunters) for the bounty #security #BugBounty #googlevrp #geminicli #infosec