Palak Sethia (@ps_doom) 's Twitter Profile
Palak Sethia

@ps_doom

ID: 383583282

calendar_today02-10-2011 04:23:51

307 Tweet

47 Followers

342 Following

Jafar Pathan (@zinja_coder) 's Twitter Profile Photo

๐Ÿš€ Exciting News! The wait is over! BrowserBruter is now public and available for download, the world's first advanced browser-based automated web application penetration testing tool! ๐Ÿ“– The documentation: ๐Ÿ”— net-square.com/browserbruter/ ๐Ÿ“ฅ Download now: ๐Ÿ”— github.com/netsquare/Browโ€ฆ

๐Ÿš€ Exciting News! The wait is over! BrowserBruter is now public and available for download, the world's first advanced browser-based automated web application penetration testing tool!

๐Ÿ“– The documentation: ๐Ÿ”— net-square.com/browserbruter/
๐Ÿ“ฅ Download now: ๐Ÿ”— github.com/netsquare/Browโ€ฆ
HackGit (@hack_git) 's Twitter Profile Photo

๐Ÿš€ Google Recaptcha Solver A Python script to solve Google reCAPTCHA using the DrissionPage library. github.com/sarperavci/Gooโ€ฆ #cybersecurity #infosec #bugbounty

Dr. Rakshit Tandon (@tandonrakshit) 's Twitter Profile Photo

Hello everyone. Inviting applications for the most coveted 11th edition of Gurugram police cyber security summer internship. . 1st June 2024 onwards. . Timings shall be 10 AM to 1 PM for Cyber Ambassadors program and 2 PM to 5 PM for Cyber Warriors program. . 30 days course.

Hello everyone.

Inviting applications for the most coveted 11th edition of Gurugram police cyber security summer internship.

. 1st June 2024 onwards. 
. Timings shall be 10 AM to 1 PM for Cyber Ambassadors program and 2 PM to 5 PM for Cyber Warriors program.
. 30 days course.
Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

If you want to override something for a quick check, set an orange conditional breakpoint there and inject the code you want to check. Here's a very basic demo on how to set them in dev tools.

James Kettle (@albinowax) 's Twitter Profile Photo

Are you a Burp Repeater power user? The latest release introduces a new feature called 'Custom actions'. With these you can quickly build your own repeater features. Here's a few samples I made for you:

Are you a Burp Repeater power user? The latest release introduces a new feature called 'Custom actions'. With these you can quickly build your own repeater features. Here's a few samples I made for you:
Ministry of Defence, Government of India (@spokespersonmod) 's Twitter Profile Photo

All media channels, digital platforms and individuals are advised to refrain from live coverage or real-time reporting of defence operations and movement of security forces. Disclosure of such sensitive or source-based information may jeopardize operational effectiveness and

Thomas Roccia ๐Ÿค˜ (@fr0gger_) 's Twitter Profile Photo

Prompt Injection is one of the first attack vectors used to exploit weaknesses or bypass behavior in AI models. Here is an illustrated thread with 5 different prompt injection techniques ๐Ÿ‘‡

Prompt Injection is one of the first attack vectors used to exploit weaknesses or bypass behavior in AI models. 

Here is an illustrated thread with 5 different prompt injection techniques ๐Ÿ‘‡
The SecOps Group (@thesecopsgroup) 's Twitter Profile Photo

๐ŸŒ ๐—œ๐—ป๐˜๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐—ถ๐—ป๐—ด ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐˜๐˜† ๐——๐—ฎ๐˜†๐˜€ ๐—ฏ๐˜† ๐—ง๐—ต๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐—ข๐—ฝ๐˜€ ๐—š๐—ฟ๐—ผ๐˜‚๐—ฝย ๐ŸŒ โœจ ๐˜“๐˜ช๐˜ฌ๐˜ฆ & ๐˜™๐˜ฆ๐˜ด๐˜ฉ๐˜ข๐˜ณ๐˜ฆ ๐˜ต๐˜ฉ๐˜ช๐˜ด ๐˜ฑ๐˜ฐ๐˜ด๐˜ต ๐ŸŽ 5 ๐˜“๐˜ถ๐˜ค๐˜ฌ๐˜บ ๐˜ž๐˜ช๐˜ฏ๐˜ฏ๐˜ฆ๐˜ณ๐˜ด ๐˜ธ๐˜ช๐˜ญ๐˜ญ ๐˜จ๐˜ฆ๐˜ต ๐˜ข ๐˜๐˜™๐˜Œ๐˜Œ ๐˜ด๐˜ฆ๐˜ข๐˜ต! At The SecOps Group, weโ€™ve always believed that cybersecurity skills

๐ŸŒ ๐—œ๐—ป๐˜๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐—ถ๐—ป๐—ด ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐˜๐˜† ๐——๐—ฎ๐˜†๐˜€ ๐—ฏ๐˜† ๐—ง๐—ต๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐—ข๐—ฝ๐˜€ ๐—š๐—ฟ๐—ผ๐˜‚๐—ฝย ๐ŸŒ 
โœจ ๐˜“๐˜ช๐˜ฌ๐˜ฆ & ๐˜™๐˜ฆ๐˜ด๐˜ฉ๐˜ข๐˜ณ๐˜ฆ ๐˜ต๐˜ฉ๐˜ช๐˜ด ๐˜ฑ๐˜ฐ๐˜ด๐˜ต ๐ŸŽ 5 ๐˜“๐˜ถ๐˜ค๐˜ฌ๐˜บ ๐˜ž๐˜ช๐˜ฏ๐˜ฏ๐˜ฆ๐˜ณ๐˜ด ๐˜ธ๐˜ช๐˜ญ๐˜ญ ๐˜จ๐˜ฆ๐˜ต ๐˜ข ๐˜๐˜™๐˜Œ๐˜Œ ๐˜ด๐˜ฆ๐˜ข๐˜ต!

At The SecOps Group, weโ€™ve always believed that cybersecurity skills
Revant Himatsingka โ€œFood Pharmerโ€ (@foodpharmer2) 's Twitter Profile Photo

Bad News: Fake ORS Scam is BACK! When ORSL got exposed they did not fix the product. They just changed the name into something similar to confuse the public. Itโ€™s shocking that even after so much public outrage & exposing they are continuing to deceive the public. I

Foster Games (@fostergamesuk) 's Twitter Profile Photo

We've decided to have a little fun on here and run a giveaway. We are giving away a Steamdeck OLED 1TB model to one lucky individual so that they are ready in time for the release of 'The Odarian Accounts: Blood and Banner'. For you to be entered into the giveaway you must: 1.

We've decided to have a little fun on here and run a giveaway. We are giving away a Steamdeck OLED 1TB model to one lucky individual so that they are ready in time for the release of 'The Odarian Accounts: Blood and Banner'. For you to be entered into the giveaway you must:
1.
Nithin Kamath (@nithin0dha) 's Twitter Profile Photo

I don't use net banking apps on my phone because the mandatory permissions they ask for make no sense. Why does a banking app need access to my SMS, phone, contacts, etc., in the name of security, when not seeking invasive device permissions is, in fact, the global benchmark

The SecOps Group (@thesecopsgroup) 's Twitter Profile Photo

๐Ÿ’ฃ ๐—ก๐—˜๐—ช ๐—˜๐—ซ๐—”๐—  ๐——๐—ฅ๐—ข๐—ฃ โ€“ ๐—”๐—ด๐—ฒ๐—ป๐˜๐—ถ๐—ฐ ๐—”๐—œ ๐—ฃ๐—ฒ๐—ป๐˜๐—ฒ๐˜€๐˜๐—ฒ๐—ฟ(๐—–-๐—”๐—ด๐—”๐—œ๐—ฃ๐—ฒ๐—ป) ๐—˜๐˜…๐—ฎ๐—บ ๐—ถ๐˜€ ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ถ๐—ฎ๐—น๐—น๐˜† ๐—Ÿ๐—œ๐—ฉ๐—˜! ๐˜๐˜ต'๐˜ด ๐˜ต๐˜ช๐˜ฎ๐˜ฆ ๐˜ต๐˜ฐ ๐˜ฃ๐˜ถ๐˜ช๐˜ญ๐˜ฅ ๐˜ฑ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜ฆ๐˜น๐˜ฑ๐˜ฆ๐˜ณ๐˜ต๐˜ช๐˜ด๐˜ฆ ๐˜ช๐˜ฏ ๐˜ต๐˜ฆ๐˜ด๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ฏ๐˜จ ๐˜ˆ๐˜จ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ค ๐˜ˆ๐˜

๐Ÿ’ฃ ๐—ก๐—˜๐—ช ๐—˜๐—ซ๐—”๐—  ๐——๐—ฅ๐—ข๐—ฃ โ€“ ๐—”๐—ด๐—ฒ๐—ป๐˜๐—ถ๐—ฐ ๐—”๐—œ ๐—ฃ๐—ฒ๐—ป๐˜๐—ฒ๐˜€๐˜๐—ฒ๐—ฟ(๐—–-๐—”๐—ด๐—”๐—œ๐—ฃ๐—ฒ๐—ป) ๐—˜๐˜…๐—ฎ๐—บ ๐—ถ๐˜€ ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ถ๐—ฎ๐—น๐—น๐˜† ๐—Ÿ๐—œ๐—ฉ๐—˜!
๐˜๐˜ต'๐˜ด ๐˜ต๐˜ช๐˜ฎ๐˜ฆ ๐˜ต๐˜ฐ ๐˜ฃ๐˜ถ๐˜ช๐˜ญ๐˜ฅ ๐˜ฑ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜ฆ๐˜น๐˜ฑ๐˜ฆ๐˜ณ๐˜ต๐˜ช๐˜ด๐˜ฆ ๐˜ช๐˜ฏ ๐˜ต๐˜ฆ๐˜ด๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ฏ๐˜จ ๐˜ˆ๐˜จ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ค ๐˜ˆ๐˜
Finshots (@finshots) 's Twitter Profile Photo

India hit E20 five years early but the sugar industry it was supposed to save can't even pay its farmers on time! Here's what's actually going on๐Ÿงต

India hit E20 five years early but the sugar industry it was supposed to save can't even pay its farmers on time!

Here's what's actually going on๐Ÿงต
Barracks (@barracksarmy) 's Twitter Profile Photo

Dev: โ€œCan you reproduce this?โ€ Researcher: โ€œIt works on my machine ๐Ÿ˜…โ€ Yeahโ€ฆ thatโ€™s not a report. If your vuln report needs a Zoom call to explain it, you already lost. How to write a good vuln report (save this): 1. Describe the issue like the reader has zero context 2.

Dev: โ€œCan you reproduce this?โ€
Researcher: โ€œIt works on my machine ๐Ÿ˜…โ€

Yeahโ€ฆ thatโ€™s not a report.

If your vuln report needs a Zoom call to explain it,
you already lost.

How to write a good vuln report (save this):
1. Describe the issue like the reader has zero context
2.