niraj (@nirajkharel7) 's Twitter Profile
niraj

@nirajkharel7

A folk who loves to hack | CRTO | CRTP

ID: 808074261634027520

linkhttps://nirajkharel.com.np calendar_today11-12-2016 22:21:32

45 Tweet

210 Followers

201 Following

Asem Eleraky (@melotover) 's Twitter Profile Photo

Bypassing E2E encryption leads to multiple high vulnerabilities. New writeup, I hope you enjoy reading! melotover.medium.com/bypassing-e2e-… #BugBounty #bugbountytips #infosec

niraj (@nirajkharel7) 's Twitter Profile Photo

I have just posted a walkthrough for the retired 'Ambassador' Box. Head over to my blog in Medium to check it out. link.medium.com/Sm5D25PM0wb #hackthebox

Joona (@joohoi) 's Twitter Profile Photo

ffuf 2.0 is out! There are couple of new major features introduced as well as updates to the project in general. I had way more to say that fits in the birdsite format, so here's a thread on more applicable platform on the topic: infosec.exchange/@joohoi/109806…

ffuf 2.0 is out! There are couple of new major features introduced as well as updates to the project in general. I had way more to say that fits in the birdsite format, so here's a thread on more applicable platform on the topic:

infosec.exchange/@joohoi/109806…
Nirmal Dahal - #Nittam  (@thenittam) 's Twitter Profile Photo

We at CryptoGen Nepal dug deep into the #trojan app named #NepaliGirl causing fear in Nepal cyberspace & found some concerning findings. Big shoutout to niraj with whom I have always had a great collaboration experience. Full Report: cryptogennepal.com/case-studies/n…

We at <a href="/CryptoGenNepal/">CryptoGen Nepal</a> dug deep into the #trojan app named #NepaliGirl causing fear in Nepal cyberspace &amp; found some concerning findings.

Big shoutout to <a href="/nirajkharel7/">niraj</a> with whom I have always had a great collaboration experience.

Full Report: cryptogennepal.com/case-studies/n…
Joe Farjallah (@lefayjey) 's Twitter Profile Photo

Need a vulnerable Active Directory environment to deploy in seconds ? I've created a template of GOADv2 using Immersive's SnapLabs. Link: dashboard.snaplabs.io/templates/73a6… #activedirectory #cybersecurity #redteaming

niraj (@nirajkharel7) 's Twitter Profile Photo

I have just published a walkthrough for the retired 'Forgot' Box. Head over to my blog in Medium to check it out.link.medium.com/2RnkBVgzUxb #HackTheBox

niraj (@nirajkharel7) 's Twitter Profile Photo

Published a walkthrough for the 'Mentor' Box which I forgot to share. Head over to my blog in Medium. nirajkharel.medium.com/htb-mentor-7c1… #htb #hackthebox

niraj (@nirajkharel7) 's Twitter Profile Photo

The note below covers the explanation of how Deserialization vulnerability occurs and the various ways it can be exploited on different programming languages. Planning to add more on it on coming days. You can find it on the below link. nirajkharel.com.np/posts/deserial…

Mobile Security (@mobilesecurity_) 's Twitter Profile Photo

DroidFrida - Portable frida injector for rooted android devices #MobileSecurity #AndroidSecurity Frida by ac3ss0r github.com/ac3ss0r/DroidF…

niraj (@nirajkharel7) 's Twitter Profile Photo

Interface has retired. It contains vulnerability CVE-2022–28368 RCE on Dompdf and privilege escalation can be done on bash arithmetic expression injection through exiftool metadata which was quite a good techinque .link.medium.com/OqisSI6rNzb

Luke Stephens (hakluke) (@hakluke) 's Twitter Profile Photo

Giveaway! 🎉 I'm going to buy someone a new MacBook Pro M2 13". To enter, retweet this tweet, then follow: Luke Stephens (hakluke), HackerContent & haksec.io. If you're a cybersecurity org looking for high quality content and social media management, check out hackercontent.com 👇

THREAT CON (@threat_con) 's Twitter Profile Photo

We're giving away an OSCP voucher to our community.🎉 To participate : 1. Follow us on Twitter. 2. Retweet this post. 3. Like this tweet. It's that simple! By completing these steps, you'll be eligible to win. Also, register now at threatcon.io/pricing. #offsec #giveaway

We're giving away an OSCP voucher to our community.🎉

To participate :
1. Follow us on Twitter.
2. Retweet this post.
3. Like this tweet.

It's that simple! By completing these steps, you'll be eligible to win.
Also, register now at threatcon.io/pricing.
#offsec #giveaway
Intigriti (@intigriti) 's Twitter Profile Photo

XXE! Automate or search for it manually? 🤔 ⚡️ An easy quick tip that can land you an XXE: In your proxy interceptor, add a match&replace rule to change content type "application/json" to "text/xml" All you have to do now is look for XML parsing errors 😎

XXE! Automate or search for it manually? 🤔

⚡️ An easy quick tip that can land you an XXE:

In your proxy interceptor, add a match&amp;replace rule to change content type "application/json" to "text/xml"

All you have to do now is look for XML parsing errors 😎
niraj (@nirajkharel7) 's Twitter Profile Photo

Getting my hands dirty with Windows Internals lately. Starting off with some process enumeration techniques in C++. Check out the blog on how to enumerate Windows processes using the ToolHelp32 API. nirajkharel.com.np/posts/process-…