imravi010 (@raviii010) 's Twitter Profile
imravi010

@raviii010

Learner | Cybersecurity

ID: 833488655171854336

calendar_today20-02-2017 01:29:15

132 Tweet

43 Followers

195 Following

r1cksec (@r1cksec) 's Twitter Profile Photo

A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for quick AD enumeration github.com/DotNetRussell/… #infosec #cybersecurity #redteam #pentest #opensource

Zierax (@zierax_x) 's Twitter Profile Photo

new tool: grafana scanner with 10 CVE checks from 2018-2025 made it cause existing ones give too many false positives. github.com/Zierax/Grafana… #Pentesting #InfoSec #BugBounty #bugbountytips #Hacking #EthicalHacking

new tool: grafana scanner with 10 CVE checks from 2018-2025 
made it cause existing ones give too many false positives.

github.com/Zierax/Grafana…

#Pentesting #InfoSec #BugBounty #bugbountytips #Hacking #EthicalHacking
imravi010 (@raviii010) 's Twitter Profile Photo

Train delayed by more than 8+ hours. Who takes responsibility for such mismanagement? What about people traveling in emergency situation? When calling 139 for assistance, no proper solution is provided, and they cut the call without clear answer. Ministry of Railways IRCTC

Train delayed by more than 8+ hours.
Who takes responsibility for such mismanagement? What about people traveling in emergency situation?
When calling 139 for assistance, no proper solution is provided, and they cut the call without clear answer. 
<a href="/RailMinIndia/">Ministry of Railways</a> <a href="/IRCTCofficial/">IRCTC</a>
Clandestine (@akaclandestine) 's Twitter Profile Photo

A Step-by-Step Guide to Uncovering Vulnerabilities in a Mobile App | by Ahmad A Abdulla | Feb, 2026 | Medium ahmadaabdulla.medium.com/a-step-by-step…

Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

Autonomous TTP execution agent for purple team operations ✅ Feed it a threat report ✅ It builds the attack plan ✅ You approve ✅ It executes github.com/Antonlovesdnb/…

Co11ateral (@co11ateral) 's Twitter Profile Photo

WatchDogKiller PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD github.com/j3h4ck/WatchDo… #dfir #threatintelligence #blueteam #redteam

WatchDogKiller

PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD

github.com/j3h4ck/WatchDo…

#dfir #threatintelligence #blueteam #redteam
Ben (@polygonben) 's Twitter Profile Photo

🚨Recent MuddyWater APT campaign, linked to Iranian intelligence, exposed by Ctrl-Alt-Intel 😬 - 10+ CVEs used - Custom-developed C2s - EtherHiding malware - Sensitive data stolen ctrlaltintel.com/threat%20resea… Super fun collab-ing with ice-wzl to get this published 🔥

OtterHacker (@otterhacker) 's Twitter Profile Photo

I published a Sharepoint and Outlook PowerShell GUI that can be used on RedTeam operation when you've found an Azure AppId with interesting privileges. You can now use these tools to browse the SharePoint or Mailboxes through a GUI instead the GraphAPI github.com/OtterHacker/M3…

AISecHub (@aisechub) 's Twitter Profile Photo

Payload Development & Evasion Engineering Map 70 technique cards across 16 categories covering the full payload lifecycle from shellcode generation through delivery. 20 attack flow chains showing real-world operator workflows like Node.js Sideload → DLL Hijack, BYOVD EDR

Payload Development &amp; Evasion Engineering Map

70 technique cards across 16 categories covering the full payload lifecycle from shellcode generation through delivery. 20 attack flow chains showing real-world operator workflows like Node.js Sideload → DLL Hijack, BYOVD EDR
Nicolas Krassas (@dinosn) 's Twitter Profile Photo

An ASPX web shell enables execution of Beacon Object Files (BOFs) on a target server using a semi-interactive Python client github.com/epotseluevskay…

R.K. (@ipo_mantra) 's Twitter Profile Photo

IMPORTANT INFORMATION IIT Kharagpur has created National Digital Library for students for all subjects. Link👇 ndl.iitkgp.ac.in It contains more than 4.75 crore precious books. Please share this information as much as possible for students to know & avail

Wietze (@wietze) 's Twitter Profile Photo

Yet another LNK flaw allows for target spoofing, yet executes any DLL, including remote ones via WebDAV. Even worse, unless you installed the Feb 2026 updates, MotW will be ignored. See how this works on github.com/wietze/lnk-it-…

Vasileiadis A. (Cyberkid) (@anastasis_king) 's Twitter Profile Photo

🔥 Just launched my FREE Bug Bounty Recon Toolkit! ✅150+ Commands ✅50+ Tools ✅Smart Domain Generator ✅SSRF | SQLi | XSS | JWT | Cloud ✅One-click copy No install needed works in browser! 🌐 hackermd-toolkit.netlify.app #BugBounty #EthicalHacking #Recon

🔥 Just launched my FREE Bug Bounty Recon Toolkit!

✅150+ Commands
✅50+ Tools 
✅Smart Domain Generator
✅SSRF | SQLi | XSS | JWT | Cloud
✅One-click copy

No install needed works in browser!

🌐 hackermd-toolkit.netlify.app

#BugBounty #EthicalHacking #Recon