
Pethuraj M
@pethuraj
Cyber Security Specialist | eWPTXv2 | Security Researcher ๐๏ธโค ๐จ๐ปโ๐ป Connect with me on LinkedIn: linkedin.com/in/pethu/
ID: 147175291
https://www.pethuraj.com 23-05-2010 12:05:43
1,1K Tweet
4,4K Followers
207 Following



๐จ ๐๐ ๐๐๐ ๐๐๐๐ฆ๐ข๐ง๐ ๐๐ฅ๐๐ฒ๐ ๐ซ๐จ๐ฎ๐ง๐ ๐๐๐๐ฌ ๐๐ฒ ๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญ Red teamers and AI/ML security folks - Microsoft just dropped an open-source toolkit for hands-on AI security testing. ๐ github.com/microsoft/AI-Rโฆ #AI #RedTeam #CyberSecurity


๐ก๏ธ ๐ช๐ฎ๐๐๐ต ๐๐ง๐ (๐๐๐ฏ๐ฒ๐ฟ ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐๐ป๐๐ฒ๐น๐น๐ถ๐ด๐ฒ๐ป๐ฐ๐ฒ) ๐cti.wazuh.com/vulnerabilitieโฆ Security researchers & Threat Intel pros: Discover Wazuhโs new open-source CTI Vulnerability Explorer. #ThreatIntelligence #CyberSecurity #Wazuh

๐ ๐๐๐ง๐ญ๐๐ฌ๐ญ ๐๐ข๐ฉ The ๐ข๐ช๐๐ฆ๐ฃ ๐ฅ๐ถ๐๐ธ ๐๐๐๐ฒ๐๐๐บ๐ฒ๐ป๐ ๐๐ฎ๐น๐ฐ๐๐น๐ฎ๐๐ผ๐ฟ is a great way to practice mapping threats to business impact and likelihood - a skill every security pro needs. ๐ javierolmedo.github.io/OWASP-Calculatโฆ #CyberSecurity #Infosec


Introducing the Top 10 OWASPยฎ Foundation Top 10s! github.com/psiinon/owasp-โฆ

๐๐ข๐ง๐ฒ ๐๐๐ ๐๐๐ฒ๐ฅ๐จ๐๐๐ฌ ๐ต A compact and creative collection of short XSS payloads - great for firewall evasion, bypassing misconfigured CSPs, and testing edge cases in web security. ๐ Check it out: tinyxss.terjanq.me #CyberSecurity #Pentest #bugbounty #XSS



๐งช ๐๐๐ง๐ญ๐๐ฌ๐ญ๐๐ซ๐ฌ, ๐๐๐ฐ ๐๐จ๐จ๐ฅ ๐๐ฅ๐๐ซ๐ญ: ๐๐๐ข๐๐จ ๐๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ ๐๐๐ง๐๐ซ๐๐ญ๐จ๐ซ ๐๐ฅ๐ฎ๐ ๐ข๐ง Transform intercepted requests into ready-to-use exploit scripts, instantly. ๐ Try it now: github.com/stealthcopter/โฆ #CyberSecurity





๐ง๐ฒ๐๐ ๐ฌ๐ผ๐๐ฟ ๐๐ ๐๐ฎ๐ฐ๐ธ๐ถ๐ป๐ด ๐ฆ๐ธ๐ถ๐น๐น๐ ๐๐ถ๐๐ต ๐๐ฎ๐ถ๐น๐ฏ๐ฟ๐ฒ๐ฎ๐ธ๐ ๐ฒ jailbreakme.xyz is an open-source decentralized app where users are challenged to jailbreak existing LLMs and uncover weaknesses with rewards for successful attempts. ๐ #CyberSecurity


๐ ๐ฅ๐ฒ๐ฝ๐ฒ๐ฎ๐๐ฒ๐ฟ ๐ฆ๐๐ฟ๐ถ๐ธ๐ฒ - Replay the same request with multiple payloads, faster & smarter An AI-powered #BurpSuite extension that turns your Repeater traffic into scan checks, bridging gap between manual testing & automation ๐ github.com/hackvertor/repโฆ #CyberSecurity

๐ด ๐๐ฒ๐ฒ๐ฝ๐ง๐ฒ๐ฎ๐บ โ ๐ง๐ต๐ฒ ๐๐๐ ๐ฅ๐ฒ๐ฑ ๐ง๐ฒ๐ฎ๐บ๐ถ๐ป๐ด ๐๐ฟ๐ฎ๐บ๐ฒ๐๐ผ๐ฟ๐ธ ๐ณ๐ผ๐ฟ ๐ฅ๐ฒ๐ฑ ๐ง๐ฒ๐ฎ๐บ๐ฒ๐ฟ๐, ๐ข๐ณ๐ณ๐ฒ๐ป๐๐ถ๐๐ฒ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต๐ฒ๐ฟ๐ & ๐ฃ๐ฒ๐ป๐๐ฒ๐๐๐ฒ๐ฟ๐ ๐ github.com/confident-ai/dโฆ #LLMSecurity #RedTeam #CyberSecurity



๐ ๐๐๐ง๐ญ๐๐ฌ๐ญ ๐๐ข๐ฉ If you want to find API authorization flaws easily, try using ๐๐๐๐ผ๐๐๐ฎ๐ด๐ด๐ฒ๐ฟ. It extracts & categorizes endpoints from OpenAPI specs to accelerate auth testing and attack surface mapping. ๐ github.com/intruder-io/auโฆ #Cybersecurity #bugbountytips
