Pranav Hivarekar

@HivarekarPranav

REST-API Lover | Loves | Proud INDIAN 😎 Handles & manages

Pune, India
Vrijeme pridruživanja: travanj 2013.

Tweetovi

Blokirali ste korisnika/cu @HivarekarPranav

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @HivarekarPranav

  1. proslijedio/la je Tweet
    4. velj

    CVE-2019-18426  
From Persistent-XSS in Whatsapp to Reading from the File System on Mac/Windows with a potential for RCE

Bounty: $12,500




    Poništi
  2. 4. velj

    Also keep yourself updated about while traveling

    Prikaži ovu nit
    Poništi
  3. 4. velj

    Facebook's student grant(free travel+accommodation) for APAC region students Check details -->

    Prikaži ovu nit
    Poništi
  4. 4. velj
    Poništi
  5. proslijedio/la je Tweet
    4. velj
    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    29. sij

    Hola everyone! The last date to submit call for nominations is 7th Feb, do submit your bugs to win amazing Prizes like Xbox, hak5 gear, 1-year PentesterLab subscription and bug bounty village unique swags. .

    Poništi
  7. proslijedio/la je Tweet
    27. sij

    Look what I shared: [ Writeup — Bugbounty Facebook ] Disclosure the verified phone number in Checkpoint. |

    Poništi
  8. proslijedio/la je Tweet
    24. sij

    Cross-Site Websocket Hijacking bug in Facebook that leads to account takeover

    Poništi
  9. proslijedio/la je Tweet
    23. sij

    I wrote a secret scanner tool and published it under my employer's GitHub org. Since I don't have much Twitter reach I appreciate any RTs! It currently will scrape Git, S3, and GDocs for secrets, and written in Rust for high performance.

    Prikaži ovu nit
    Poništi
  10. 22. sij
    Poništi
  11. proslijedio/la je Tweet
    21. sij

    Opensourcing another project from team , Simple and Fast port scanner with handy features to use with another tool in your recon pipeline. Link to project:-

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    16. sij

    Reversing XignCode3 Driver – Part 2 – Analyzing init functions Part 2 is online! Understand how the Anticheat Driver inits some custom structures and variables that are later used to dispatch the different IOCTLs.

    Poništi
  13. proslijedio/la je Tweet
    16. sij

    I watched all 44 2019 talks (~32 hours of video) and wrote detailed summaries for you 📚 Learn about , scaling security, threat modeling, building a security program, & more.

    Prikaži ovu nit
    Poništi
  14. 16. sij
    Poništi
  15. proslijedio/la je Tweet
    12. sij

    Just posted Remote Code Execution in Three Acts: Chaining Exposed Actuators and H2 Database Aliases in Spring Boot 2. Using a payload containing three different programming languages :)

    Poništi
  16. 9. sij
    Poništi
  17. proslijedio/la je Tweet
    7. sij

    The recording of my talk "Unveiling the Underground World of Anti-Cheats" at BlackHat Europe 2019 is now online! :D A pleasure to be part of !!  

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    8. sij

    Bug Bounty hunters & Pentesters alike, they all love to run their own domain and DNS Servers to log Out of Band interactions caused by RCEs, XXE's SSRFs and blind requests. And now you can do that too! Better safe than sorry!

    Poništi
  19. proslijedio/la je Tweet
    8. sij

    We dedicate this week to give a shoutout to our hard working volunteers who put in efforts tirelessly for the success of OWASP Seasides : A strong pillar of the team. The one who got us the maximum sponsors. Ever reliable and totally dedicated towards the conference

    Poništi
  20. proslijedio/la je Tweet

    Our researchers found multiple vulnerabilities in TikTok leading to account manipulation

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·