gujjuboy10x00 (@vis_hacker) 's Twitter Profile
gujjuboy10x00

@vis_hacker

Vishal Panchani security Engineer | hall of fame from Google ,paypal , brickftp and many more. keep calm and hack the planet. Top 10 in hackerone alltime

ID: 848469810362986497

linkhttps://medium.com/@vis_hacker calendar_today02-04-2017 09:39:01

1,1K Tweet

6,6K Followers

662 Following

Mitesh Patel (@mitesh_engr) 's Twitter Profile Photo

हर हर महादेव !! 🙏🙏 महा शिवरात्रि की हार्दिक शुभकामनाएं। #महाशिवरात्रि

shubs (@infosec_au) 's Twitter Profile Photo

Last year, JS0N Haddix, brendan, sean and I found a pre-auth RCE in Oracle Opera - CVE-2023-21932. This product holds the PII of every guest (including credit cards 😱). It's used by almost all of the big hotel/resort chains around the world. blog.assetnote.io/2023/04/30/rce… - 1/4

Last year, <a href="/Jhaddix/">JS0N Haddix</a>, <a href="/bscarvell/">brendan</a>, <a href="/seanyeoh/">sean</a> and I found a pre-auth RCE in Oracle Opera - CVE-2023-21932. This product holds the PII of every guest (including credit cards 😱). It's used by almost all of the big hotel/resort chains around the world. blog.assetnote.io/2023/04/30/rce… - 1/4
shubs (@infosec_au) 's Twitter Profile Photo

For a few months, Sam Curry, Brett Buerhaus, rhys and I focused on hacking EPP servers / ccTLD zones. We're disclosing our work today on the hackcompute blog: hackcompute.com/hacking-epp-se… Our efforts in this space led to the ability to control the DNS zones of the following

PortSwigger Research (@portswiggerres) 's Twitter Profile Photo

Chrome has just unleashed popovers: modal dialogs without JS! Of course you can abuse them for XSS filter evasion: portswigger.net/web-security/c…

Chrome has just unleashed popovers: modal dialogs without JS! Of course you can abuse them for XSS filter evasion:

portswigger.net/web-security/c…
shubs (@infosec_au) 's Twitter Profile Photo

The impact achieved here is neat: labs.hakaioffsec.com/nginx-alias-tr… - I remember first reading about this from Frans Rosén - blog.detectify.com/2020/11/10/com…

Johan Carlsson (@joaxcar) 's Twitter Profile Photo

I have finally done my first proper bug write-up! This one is about a SOP bypass in Chrome (escalated to ATO) using the Navigation API. Hope someone finds it interesting. Feel free to leave me any comments; I want to improve on this! joaxcar.com/blog/2023/10/0…

Derin Eryilmaz (@deryilz) 's Twitter Profile Photo

My first blog post! It's about CVE-2023-4369, a $10,000 bug I found in ChromeOS in July. The bug used a chrome:// URL XSS to allow Chrome extensions to execute privileged code and read/edit downloaded files without user interaction. 👀 0x44.xyz/blog/cve-2023-…

Omid Rezaei (@omidxrz) 's Twitter Profile Photo

I just published a write-up about an account takeover where I abused reverse proxy to hijack the OAuth Code. blog.voorivex.team/hijacking-oaut…

Geekboy (@emgeekboy) 's Twitter Profile Photo

🎉 Big congrats to Harsh Jaiswal & Rahul Maini for their incredible research on hacking into Apple using a 0-day in Lucee CMS! 🍎🔥 Check out their detailed blog post to learn more about their findings and methodology: blog.projectdiscovery.io/hello-lucee-le… #AppleHack #Lucee #0Day

shubs (@infosec_au) 's Twitter Profile Photo

Our security researcher hashkitten found one of the most critical exploit chains in the history of Assetnote. Affecting 40k+ instances of ServiceNow, we could execute arbitrary code, access all data without authentication. You can read our blog here: assetnote.io/resources/rese…

Our security researcher <a href="/hash_kitten/">hashkitten</a> found one of the most critical exploit chains in the history of <a href="/assetnote/">Assetnote</a>. Affecting 40k+ instances of ServiceNow, we could  execute arbitrary code, access all data without authentication. You can read our blog here: assetnote.io/resources/rese…
James Kettle (@albinowax) 's Twitter Profile Photo

When researching request smuggling, I decided that TE.0 would never be exploitable because it requires the back-end server to accept a HTTP request starting with a number + newline.... and no server would be that crazy 🤦‍♂️ Awesome work! Never under-estimate the crazy.

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! blog.orange.tw/2024/08/confus… Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code

Elon Musk (@elonmusk) 's Twitter Profile Photo

Mario Draghi’s critique is accurate. A thorough review of EU regulations to eliminate unnecessary rules and streamline activity in Europe would revitalize growth and strengthen competitiveness. Things should be default legal, rather than default illegal.

Michael Stepankin (@artsploit) 's Twitter Profile Photo

Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! Read it all below 🧵

Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! Read it all below 🧵