Rakesh Mane (@rakeshmane10) 's Twitter Profile
Rakesh Mane

@rakeshmane10

Tech. Bug Hunting. CTFs. Security Engineering.

ID: 1521519164

linkhttps://rakeshmane.com calendar_today16-06-2013 07:33:37

1,1K Tweet

3,3K Followers

1,1K Following

Bhavuk Jain (@bhavukjain1) 's Twitter Profile Photo

Solved! Chrome debugger was enabled and allowed access via http://localhost:9222/json. This allowed exfiltrating data from other users whosoever was hitting this headless chrome browser - more info here - chromedevtools.github.io/devtools-proto… Thanks everyone for the tips :)

Jason Haddix (@jhaddix) 's Twitter Profile Photo

Are you a web tester who specializes in blind or out-of-band vulns? Check out CoWitness, a dope (stand alone) alternative to Collaborator by TrustedSec which adds URI and User-Agent. github.com/stolenusername… trustedsec.com/blog/introduci…

Are you a web tester who specializes in blind or out-of-band vulns? 

Check out CoWitness, a dope (stand alone) alternative to Collaborator by <a href="/TrustedSec/">TrustedSec</a> which adds URI and User-Agent.

github.com/stolenusername…

trustedsec.com/blog/introduci…
Justin Gardner (@rhynorater) 's Twitter Profile Photo

Understanding the basic functions of the browser and the key technologies we work with surrounding it (Cookies, SOP, CORS, JS Quirks) is so important and vastly underestimated in the eyes of most aspiring hackers. Read the specs, get curious about how it all works. In the long

s1r1us (@s1r1u5_) 's Twitter Profile Photo

Here is the blog post for CVE-2023-22515: Broken Access Control Vulnerability in Confluence Data Center and Server I've left two challenges in it, try to solve them. If you solve second one, that would be a 0-day 😅 blog.s1r1us.ninja/research/broke…

Ayoub FATHI 阿尤布 (@_ayoubfathi_) 's Twitter Profile Photo

I’ve published the slides for my Security BSides Ahmedabad closing keynote: bit.ly/pwning-cloud-c… In this talk, I shared: “Lateral movement brute forcing” — a new technique that I covered and used against different targets to go, eg. From a limited GitHub token to achieve multi-lateral

Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

Wait. What. Hehe. https://alert(1)@ example. com <a href=/ id=x>test</a> <script> eval(x.username) </script> Inspired by: x.com/joaxcar/status…

‌Renwa (@renwax23) 's Twitter Profile Photo

New writing: You Are Not Where You Think You Are, Browser Address Bar Spoofing For the past year I focused on browser URL bar spoofing vulnerabilities and I found multiple bugs inside Opera Browsers both Mobile and Desktop using various techniques medium.com/@renwa/aa36ad8…

payloadartist (@payloadartist) 's Twitter Profile Photo

🔥 OAuth "token reuse" vulnerability An interesting OAuth attack technique by Aviad Carmel that reused OAuth tokens from a different app to fully takeover victim's account in many popular apps like Grammarly salt.security/blog/oh-auth-a… #bugbountytips #bugbounty #cybersecurity

🔥  OAuth "token reuse" vulnerability 

An interesting OAuth attack technique by <a href="/AviadCarmel/">Aviad Carmel</a> that reused OAuth tokens from a different app to fully takeover victim's account in many popular apps like Grammarly  

salt.security/blog/oh-auth-a…

#bugbountytips #bugbounty #cybersecurity
HTTPVoid (@httpvoid0x2f) 's Twitter Profile Photo

Check out our new blog post! We hacked into Apple Travel Portal (yes, again!) using a 0-day Remote Code Execution exploit. Part 1 is live now, stay tuned for the follow-up on another RCE worth a total bounty of $40k! blog.projectdiscovery.io/hello-lucee-le…

PT SWARM (@ptswarm) 's Twitter Profile Photo

🧧 Our researcher Igor Sak-Sakovskiy has discovered an XXE in Chrome and Safari by ChatGPT! Bounty: $28,000 💸 Here is the write-up 👉 swarm.ptsecurity.com/xxe-chrome-saf…

🧧 Our researcher Igor Sak-Sakovskiy has discovered an XXE in Chrome and Safari by ChatGPT!

Bounty: $28,000 💸

Here is the write-up 👉
swarm.ptsecurity.com/xxe-chrome-saf…
Sonar Research (@sonar_research) 's Twitter Profile Photo

🔥 XSS on any website with missing charset information? 😳 Attackers may leverage the ISO-2022-JP character encoding to inject arbitrary JavaScript code into a website. Read more in our latest blog post: sonarsource.com/blog/encoding-… #appsec #security #vulnerability

🔥 XSS on any website with missing charset information? 😳

Attackers may leverage the ISO-2022-JP character encoding to inject arbitrary JavaScript code into a website. Read more in our latest blog post:

sonarsource.com/blog/encoding-…

#appsec #security #vulnerability
Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

Everyone knows that the RFCs for email addresses are crazy. This post will show without doubt that you should not be following the RFC. portswigger.net/research/split…

Rafay Baloch (@rafaybaloch) 's Twitter Profile Photo

.Rakesh Mane solved #XSS Challenge with identical solution as "Abdul Aziz Khan", making it the shortest. For the record, the number of characters are "55". Link: xss.redseclabs.com #xss #challenge #BugBounty

zhero; (@zhero___) 's Twitter Profile Photo

the research paper is out: Next.js and the corrupt middleware: the authorizing artifact result of a collaboration with inzo that led to CVE-2025-29927 (9.1-critical) zhero-web-sec.github.io/research-and-t… enjoy the read!

the research paper is out:

Next.js and the corrupt middleware: the authorizing artifact

result of a collaboration with <a href="/inzo____/">inzo</a> that led to CVE-2025-29927 (9.1-critical)

zhero-web-sec.github.io/research-and-t…

enjoy the read!