Dhiraj

576 posts

Dhiraj banner
Dhiraj

Dhiraj

@RandomDhiraj

Security Researcher, Learning & Fuzzing!

nowhere Katılım Haziran 2015
130 Takip Edilen3.3K Takipçiler
Dhiraj
Dhiraj@RandomDhiraj·
Here’s my write-up on a code execution in Google Gemini CLI. @dhiraj_mishra/code-execution-in-google-gemini-4e5909ec167d" target="_blank" rel="nofollow noopener">medium.com/@dhiraj_mishra#infosec
Dhiraj tweet media
English
0
8
75
3.9K
Dhiraj
Dhiraj@RandomDhiraj·
I found a uXSS in DuckDuckGo Browser and here is the write-up. @dhiraj_mishra/duckduckgo-browser-uxss-via-autoconsent-js-bridge-02e3bc27a430" target="_blank" rel="nofollow noopener">medium.com/@dhiraj_mishra#infosec
English
0
9
78
5.4K
Dhiraj
Dhiraj@RandomDhiraj·
I am sharing it, as this also affects self-hosted runners, usually enterprise servers aren't hardened enough so you can test this during RT/PT. (#hardening-for-self-hosted-runners" target="_blank" rel="nofollow noopener">docs.github.com/en/actions/ref…)
English
0
0
0
216
Dhiraj
Dhiraj@RandomDhiraj·
GH response via H1 - This is an intentional design decision. If you're able to gain a token and access contents outside of your repository's scope, we would certainly be interested.
English
1
0
0
250
Dhiraj
Dhiraj@RandomDhiraj·
I started reversing GitHub Actions, focusing on escaping the container responsible for running the jobs and found and exploited a volume injection vulnerability that was marked as informative on H1 by GH security. #infosec #redteam
Dhiraj tweet media
English
1
0
7
485
Dhiraj
Dhiraj@RandomDhiraj·
We are sharing it, as this also affects self-hosted runners, usually enterprise servers aren't hardened enough so you can test this during RT/PT. (#hardening-for-self-hosted-runners" target="_blank" rel="nofollow noopener">docs.github.com/en/actions/ref…)
English
0
0
0
131
Dhiraj
Dhiraj@RandomDhiraj·
GH response via H1 - This is an intentional design decision. If you're able to gain a token and access contents outside of your repository's scope, we would certainly be interested.
English
1
0
0
165
Dhiraj
Dhiraj@RandomDhiraj·
Found a bypass in `xmldsigjs` that allows XML signature wrapping, letting modified data pass the signature verification; This is now fixed in 2.8.5. POC - (github.com/inputzero/Secu…) #infosec
Dhiraj tweet media
English
0
0
0
227
Dhiraj
Dhiraj@RandomDhiraj·
Here is the write-up for my recent work RCE in AWS Kiro IDE (CVE-2026-0830). @dhiraj_mishra/cve-2026-0830-aws-kiro-gitlab-helper-remote-code-execution-1f826469228d" target="_blank" rel="nofollow noopener">medium.com/@dhiraj_mishra#infosec #AI
Dhiraj tweet media
English
0
5
23
3.7K
Dhiraj retweetledi
Cobalt
Cobalt@cobalt_io·
Cobalt Core member @RandomDhiraj demonstrates how a malicious .git/config can trigger execution via IDE automation, turning a routine action into an initial access vector. Read on → hubs.la/Q03ZJYwr0
English
0
1
3
489
Dhiraj
Dhiraj@RandomDhiraj·
@Blackhatmea If you’re around, feel free to drop by and say hello. I’ll have a little swag to share too.
Dhiraj tweet media
English
0
0
0
200