ɴɪᴛɪɴ ɢᴀᴠʜᴀɴᴇ (@nitingavhane_) 's Twitter Profile
ɴɪᴛɪɴ ɢᴀᴠʜᴀɴᴇ

@nitingavhane_

Security Consultant | •Ethical hacker | •Security Researcher | •Angular Frontend Developer | •Google CFP 2022 | •Open Source Comunity Memeber 📟

ID: 1061339909162598400

linkhttps://bio.link/nitingavhane calendar_today10-11-2018 19:28:47

2,2K Tweet

606 Followers

220 Following

𐰚𐰼𐰇𐱅 (@ynsmroztas) 's Twitter Profile Photo

Just dropped a scanner for CVE-2026-39808 🔥 FortiSandbox < 4.4.9 — Unauthenticated RCE as root The jid parameter in /fortisandbox/job-detail/tracer-behavior is vulnerable to OS command injection. No auth. No complexity. Just pipe and execute. CVSS: 9.8 💀 Tool features: →

Just dropped a scanner for CVE-2026-39808 🔥

FortiSandbox &lt; 4.4.9 — Unauthenticated RCE as root

The jid parameter in /fortisandbox/job-detail/tracer-behavior is vulnerable to OS command injection. No auth. No complexity. Just pipe and execute.

CVSS: 9.8 💀

Tool features:
→
AlgoMaster.io (@algomaster_io) 's Twitter Profile Photo

14 must-know Data Structures for coding interviews: 1. Array 2. Queue 3. Deque 4. Matrix 5. Stack 6. Binary Tree 7. Linked List 8. Doubly Linked List 9. HashMap 10. Binary Search Tree (BST) 11. Heap (Priority Queue) 12. Trie 13. Graph 14. Union Find ♻️ Repost to help others in

14 must-know Data Structures for coding interviews:

1. Array
2. Queue
3. Deque
4. Matrix
5. Stack
6. Binary Tree
7. Linked List
8. Doubly Linked List
9. HashMap
10. Binary Search Tree (BST)
11. Heap (Priority Queue)
12. Trie
13. Graph
14. Union Find

♻️ Repost to help others in
Aditi Singh (@aditi_singghh) 's Twitter Profile Photo

Working on hardware devices has been fun lately. Recently crossed ~$20k in bounties from Amazon’s Device Vulnerability Research Program (mostly FireTV) on HackerOne . A lot of learning along the way, especially around device-level security. Still have a few reports under review

Working on hardware devices has been fun lately.
Recently crossed ~$20k in bounties from Amazon’s Device Vulnerability Research Program (mostly FireTV) on <a href="/Hacker0x01/">HackerOne</a> .
A lot of learning along the way, especially around device-level security. Still have a few reports under review
Shivang Maurya (@shivangmauryaa) 's Twitter Profile Photo

Bounty : 250 Euro Well admin can only invite admin and low level user. POST /api/users/invite/ Expected : role":"admin" Changed to : role":"SuperAdmin" I got invited as superadmin. Got Fixed and rewarded in 8 hours haha

Bounty : 250 Euro 

Well admin can only invite admin and low level user.

POST /api/users/invite/ 

Expected : role":"admin"

Changed to : role":"SuperAdmin"

I got invited as superadmin.

Got Fixed and rewarded in 8 hours haha
Dark Night (@dark_night263) 's Twitter Profile Photo

Claude-Red: Turn Claude into a Red Team Operator with 38 Offensive Security Skills. 🤖💀 Prebuilt SKILL .md modules for SQLi, XSS, EDR evasion, exploit dev, OSINT & more — structured like real attacker workflows. AI is powerful, but garbage input = garbage output. Skills define

Chaofan Shou (svm/acc) (@shoucccc) 's Twitter Profile Photo

Chinese LLMs can hack better than state-sponsored hackers with properly evolved harness - Kimi K2.5 managed to find and exploit 6 vulnerabilities in browsers: a single page view or an extension install by victims equal full system hijack. Check arxiv.org/abs/2604.20801

Chinese LLMs can hack better than state-sponsored hackers with properly evolved harness - 

Kimi K2.5 managed to find and exploit 6 vulnerabilities in browsers: a single page view or an extension install by victims equal full system hijack. 

Check arxiv.org/abs/2604.20801
Shraddha Bharuka (@bharukashraddha) 's Twitter Profile Photo

📂 Claude Code Project Anatomy Most devs use CLAUDE.md wrong. That’s why their AI still feels like a chatbot. If you want Claude to act like a senior engineer… your repo needs structure 👇 Claude needs 4 things: • WHY → what the system does • MAP → where things live •

📂 Claude Code Project Anatomy

Most devs use CLAUDE.md wrong.
That’s why their AI still feels like a chatbot.

If you want Claude to act like a senior engineer…
your repo needs structure 👇

Claude needs 4 things:

• WHY → what the system does
• MAP → where things live
•
Abhi Sharma 𝕏 (@a13h1_) 's Twitter Profile Photo

“$800 Bounty: Privilege Escalation via API — From Scheduler to Team Admin” by Abhi Sharma infosecwriteups.com/800-bounty-pri…

“$800 Bounty: Privilege Escalation via API — From Scheduler to Team Admin” by Abhi Sharma infosecwriteups.com/800-bounty-pri…
Leonard Rodman (@rodmanai) 's Twitter Profile Photo

Stop telling Claude: "build this" Stop telling Claude: "write code" Stop telling Claude: "fix this bug" You're using a staff-level AI like a junior intern. Claude performs best when you give: • role • constraints • architecture expectations • output format • real-world

Stop telling Claude: "build this"
Stop telling Claude: "write code"
Stop telling Claude: "fix this bug"

You're using a staff-level AI like a junior intern.

Claude performs best when you give:
• role
• constraints
• architecture expectations
• output format
• real-world
Dhanian 🗯️ (@e_opore) 's Twitter Profile Photo

Python + LangChain → LLM Apps Python + LangChain → RAG Systems Python + OpenAI Python SDK → AI Assistants Python + Hugging Face Transformers → Model Hub Python + SentenceTransformers → Embeddings & Vector DB Python + FAISS → Similarity Search Python + Pinecone → Managed

Python + LangChain → LLM Apps
Python + LangChain → RAG Systems
Python + OpenAI Python SDK → AI Assistants
Python + Hugging Face Transformers → Model Hub
Python + SentenceTransformers → Embeddings &amp; Vector DB
Python + FAISS → Similarity Search
Python + Pinecone → Managed
Shraddha Bharuka (@bharukashraddha) 's Twitter Profile Photo

📂 AWS Stack ┃ ┣ 📂 Compute ┃ ┣ EC2 (Virtual Servers) ┃ ┣ Lambda (Serverless) ┃ ┣ ECS (Containers) ┃ ┣ EKS (Kubernetes) ┃ ┗ Elastic Beanstalk ┃ ┣ 📂 Storage ┃ ┣ S3 (Object Storage) ┃ ┣ EBS (Block Storage) ┃ ┣ EFS (File Storage) ┃ ┣ Glacier (Archive) ┃ ┗

📂 AWS Stack
┃
┣ 📂 Compute
┃ ┣ EC2 (Virtual Servers)
┃ ┣ Lambda (Serverless)
┃ ┣ ECS (Containers)
┃ ┣ EKS (Kubernetes)
┃ ┗ Elastic Beanstalk
┃
┣ 📂 Storage
┃ ┣ S3 (Object Storage)
┃ ┣ EBS (Block Storage)
┃ ┣ EFS (File Storage)
┃ ┣ Glacier (Archive)
┃ ┗
Vozec (@vozec1) 's Twitter Profile Photo

I just POC Pack2TheRoot (CVE-2026-41651) : - github.com/Vozec/CVE-2026… Local Privilege Escalation in PackageKit discovered by telekom.com affecting Ubuntu/Debian/RockyLinux/Fedora

I just POC Pack2TheRoot (CVE-2026-41651) : 
- github.com/Vozec/CVE-2026…
Local Privilege Escalation in PackageKit discovered by telekom.com affecting Ubuntu/Debian/RockyLinux/Fedora
Dark Night (@dark_night263) 's Twitter Profile Photo

OSV-Scanner: Supply Chain Vulnerability Hunting for DevSecOps Pipelines. 🛠️💀 Scan dependencies, containers, and code for real CVEs with low false positives + quick remediation. github.com/google/osv-sca… #CyberSecurity #DevSecOps #AppSec #VulnerabilityManagement

a7madn1 (@a7mad__n1) 's Twitter Profile Photo

Second Write up: Yeah I got my second bonus $$$ on a public bug bounty program. (EASY Tecnic). Steps To Reproduce: 1/n 1.Identify multiple contact forms & Observe that all forms are protected by CAPTCHA. 2. The full endpoint /_vcp/test/_test/contactprocess/