Rishabh Shrivastava (@wickedwickv2) 's Twitter Profile
Rishabh Shrivastava

@wickedwickv2

It's better to live your life imperfectly than imitating someone's else..

ID: 1264218105091424256

calendar_today23-05-2020 15:34:37

2,2K Tweet

104 Takipçi

255 Takip Edilen

Didit (@diditprotocol) 's Twitter Profile Photo

Are legacy IDV vendors draining your budget with hidden fees and complex contracts? Use our free ROI calculator to see exactly how much you can save with Didit's transparent, pay-per-success model. The results might surprise you.

André Baptista (@0xacb) 's Twitter Profile Photo

Hacking a GraphQL API but introspection is disabled? Clairvoyance, a tool by Nikita Stupin, can reconstruct GraphQL API schema even if the introspection is disabled.  For installation and usage 👇 github.com/nikitastupin/c…

PentesterLab (@pentesterlab) 's Twitter Profile Photo

🔥 CVE-2026-23993: HarbourJwt JWT auth bypass via unknown alg. Not just alg=none: unsupported alg => empty signature, so forged token header.payload. passes. Write-up + fix: pentesterlab.com/blog/cve-2026-…

dawgyg - WoH (@thedawgyg) 's Twitter Profile Photo

Reading through this awesome write up right now on my quest to get a working Chrome RCE <3 blog.perfect.blue/Chromium-Fullc…

reverseame (@reverseame) 's Twitter Profile Photo

Pentesting Next.js Server Actions #Nextjs #Pentesting #ServerActions #BurpSuite #SecurityTools adversis.io/blogs/pentesti…

Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

If you haven't watched ep. 162 yet, we talked with Alex Rice from HackerOne and here are the most important questions and answers: 1. Are they training AI models on researcher reports? (8:50) No. The part of their ToS that mentions AI training was written a long time ago,

André Baptista (@0xacb) 's Twitter Profile Photo

Lost in Translation: Exploiting Unicode Normalization With this research, Ryan Barnett (B0N3) and Angel Hacker added another layer of understanding to this area. They introduced a lot of very interesting techniques. Check it out 👇 youtu.be/ETB2w-f3pM4?si…

Patrik Fehrenbach (@itsecurityguard) 's Twitter Profile Photo

New series on using Claude for bug bounty 👀. sync your hackerone reports, cross-referencing past findings against new targets etc. The actual workflow, not the LinkedIn fantasy. Feedback from AI-maxers always welcome ❤️ clawd.it/posts/11-teach…

Damian Strobel (@damian_89_) 's Twitter Profile Photo

Another read about the topic of "dead subdomains" and why I decided to keep them in argosdns.io argosdns.io/blog/a-dead-su… (But: DNS data will come soon to the platform :))

8kSec (@8ksec) 's Twitter Profile Photo

This blog walks through Android deep link and WebView exploitation, bypassing host validation to exfiltrate credentials from shared_prefs via JavaScript: 8ksec.io/android-deepli… Tested on InsecureShop using ADB + Frida.

This blog walks through Android deep link and WebView exploitation, bypassing host validation to exfiltrate credentials from shared_prefs via JavaScript: 8ksec.io/android-deepli… Tested on InsecureShop using ADB + Frida.