Er Pratik Panchal🐬

2.1K posts

Er Pratik Panchal🐬 banner
Er Pratik Panchal🐬

Er Pratik Panchal🐬

@iDiablo5

💻 = 'print("Playing on :", (@Hacker0x01 + @SynackRedTeam))' exec(💻)

Ahmadabad City, India Katılım Temmuz 2014
453 Takip Edilen1.4K Takipçiler
Er Pratik Panchal🐬 retweetledi
bugcrowd
bugcrowd@Bugcrowd·
Popping alert(1) doesn't show REAL impact. Escalate your XSS by stealing cookies instead👇 Better XSS escalation paths here: bugcrowd.com/blog/the-ultim…
English
10
114
1.6K
175.8K
Er Pratik Panchal🐬 retweetledi
NullSecurityX
NullSecurityX@NullSecurityX·
🧠 Path Traversal in Zip Upload 1️⃣ App extracts user-uploaded ZIP files 2️⃣ Payload includes ../../../../etc/passwd 3️⃣ No sanitization on file paths 4️⃣ Files written outside intended dir 🎯 ZIP → arbitrary write #bugbounty #pathtaversal #bugbountytip
NullSecurityX tweet media
English
1
42
147
8.6K
Er Pratik Panchal🐬 retweetledi
Godfather Orwa 🇯🇴
Godfather Orwa 🇯🇴@GodfatherOrwa·
SQL Injection Payload i was able to locate a SQL injection very hard to exploit , with digging I successfully got it with the sleep payload ''||(select 1 from (select pg_sleep(6))x)||' ==> i added as well to my SQL wordlist happy hunting ♥ #bugbountytips #bugbountytip #bugbounty
Godfather Orwa 🇯🇴 tweet media
English
9
99
609
33.5K
Er Pratik Panchal🐬 retweetledi
Intigriti
Intigriti@intigriti·
CF-Hero is a simple tool that helps you discover the origin IP of Cloudflare-protected servers using multiple sources! 😎 🔗 github.com/musana/CF-Hero
Intigriti tweet media
English
1
32
209
13.4K
Er Pratik Panchal🐬 retweetledi
NullSecurityX
NullSecurityX@NullSecurityX·
App returns: {"msg": "Welcome, USER!"} Inject "}]},"x":1,"y":" 👉 If parsed into DOM (e.g., via innerHTML), it’s game over. ⚠️ Watch for JSON.parse() + DOM sink patterns. #XSS #JSONInjection #AppSec #bugbounty
NullSecurityX tweet mediaNullSecurityX tweet media
English
3
25
135
11.3K
Er Pratik Panchal🐬 retweetledi
NullSecurityX
NullSecurityX@NullSecurityX·
🧠 IDOR in Mobile API 1️⃣ Mobile app uses incremental user IDs: /api/user/1023 2️⃣ No auth check on user ID param 3️⃣ Change ID → access others' PII 4️⃣ Full account takeover via mobile 🎯 Predictable IDs + missing auth = 💥 #bugbounty #idor #mobileapp #infosec
NullSecurityX tweet media
English
0
16
127
5.8K
Er Pratik Panchal🐬 retweetledi
N$🌟
N$🌟@nav1n0x·
Discovered a cool Windows LFI during a pentest in a widely used tool. This might be a 0-day — I found over 5k+ affected installations. Possibly another CVE in the pipeline. Payload: /login/xxx/CustomImages.aspx?XXXX=logo.png..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cwindows%5cPFRO.log #BugBounty
N$🌟 tweet mediaN$🌟 tweet media
English
9
63
592
36.3K
Er Pratik Panchal🐬 retweetledi
NullSecurityX
NullSecurityX@NullSecurityX·
🧠 WAF Bypass via JSON-Based SQLi 1️⃣ WAF blocks classic payloads in query params 2️⃣ App parses JSON body: {"user":"admin' OR 1=1--"} 3️⃣ WAF doesn’t inspect JSON deeply 4️⃣ Payload reaches backend → SQLi triggers 🎯 JSON input → stealth injection #bugbounty #wafbypass #sqli
NullSecurityX tweet media
English
1
38
266
14.1K
Er Pratik Panchal🐬 retweetledi
Het Mehta
Het Mehta@hetmehtaa·
LLMs are getting scary good at red teaming. AIRTBench just dropped 70 black-box CTFs, no hints. Models had to write real code to find + exploit vulns. Results: Claude 3.5: 61% GPT-4.5: 49% Llama 4: 10% And did it 5000× faster than humans. Read it: arxiv.org/pdf/2506.14682 #AI #Cybersecurity #LLM #CTF #AIRTBench
English
4
12
28
1.9K
Er Pratik Panchal🐬 retweetledi
Het Mehta
Het Mehta@hetmehtaa·
Top 100+ Web Vulnerabilities, Categorised Into Various Types: > Injection Vulnerabilities 1. SQL Injection (SQLi) 2. Cross-Site Scripting (XSS) 3. Cross-Site Request Forgery (CSRF) 4. Remote Code Execution (RCE) 5. Command Injection 6. XML Injection 7. LDAP Injection 8. XPath Injection 9. HTML Injection 10. Server-Side Includes (SSI) Injection 11. OS Command Injection 12. Blind SQL Injection 13. Server-Side Template Injection (SSTI) 14. CRLF Injection 15. NoSQL Injection 16. HQL Injection > Broken Authentication and Session Management 17. Session Fixation 18. Brute Force Attack 19. Session Hijacking 20. Password Cracking 21. Weak Password Storage 22. Insecure Authentication 23. Cookie Theft 24. Credential Reuse 25. Insecure Login Pages 26. Insecure Session IDs 27. Predictable Login Credentials > Sensitive Data Exposure 28. Inadequate Encryption 29. Insecure Direct Object References (IDOR) 30. Unencrypted Data Storage 31. Missing Security Headers 32. Insecure File Handling 33. Information Leakage in Logs 34. Hardcoded Secrets > Security Misconfiguration 35. Default Passwords 36. Directory Listing 37. Unprotected API Endpoints 38. Open Ports and Services 39. Misconfigured Error Handling 40. Stack Traces Exposed 41. Verbose Error Messages 42. Insecure Default Configurations 43. Insufficient Backup Procedures 44. Misconfigured Security Headers (e.g., X-Frame-Options) > Improper Access Controls 45. Information Disclosure 46. Unpatched Software 47. Misconfigured CORS 48. HTTP Security Headers Misconfiguration 49. Lack of Access Control on Administrative Interfaces 50. Directory Traversal 51. Weak File Permissions > XML-Related Vulnerabilities 52. XML External Entity (XXE) Injection 53. XML Entity Expansion (XEE) 54. XML Bomb 55. XML Signature Wrapping > Broken Access Control 56. Inadequate Authorization 57. Privilege Escalation 58. Forceful Browsing 59. Missing Function-Level Access Control 60. Unvalidated Redirects and Forwards 61. Excessive Data Exposure > Insecure Deserialization 62. Remote Code Execution via Deserialization 63. Data Tampering 64. Object Injection 65. Type Confusion > API Security Issues 66. Insecure API Endpoints 67. API Key Exposure 68. Lack of Rate Limiting 69. Inadequate Input Validation 70. Lack of Proper Authentication 71. Improper API Endpoint Security > Insecure Communication 72. Man-in-the-Middle (MITM) Attack 73. Insufficient Transport Layer Security (TLS) 74. Insecure SSL/TLS Configuration 75. Insecure Communication Protocols 76. Deprecated Cryptographic Algorithms 77. Lack of Encryption in Transit > Client-Side Vulnerabilities 78. DOM-based XSS 79. Insecure Cross-Origin Communication 80. Browser Cache Poisoning 81. Clickjacking 82. HTML5 Security Issues 83. Client-Side URL Redirection 84. Form Hijacking 85. WebSocket Security Issues > Denial of Service (DoS) 86. Distributed Denial of Service (DDoS) 87. Application Layer DoS 88. Resource Exhaustion 89. Slowloris Attack 90. XML Denial of Service 91. HTTP Flood Attack 92. UDP Amplification Attack > Other Web Vulnerabilities 93. Server-Side Request Forgery (SSRF) 94. HTTP Parameter Pollution (HPP) 95. Insecure Redirects and Forwards 96. File Inclusion Vulnerabilities (LFI/RFI) 97. Security Header Bypass 98. Inadequate Session Timeout 99. Insufficient Logging and Monitoring 100. Business Logic Vulnerabilities 101. API Abuse 102. JSON Web Token (JWT) Security Issues 103. Insufficient Anti-Automation Measures > Mobile Web Vulnerabilities 104. Insecure Data Storage on Mobile Devices 105. Insecure Data Transmission on Mobile Devices 106. Insecure Mobile API Endpoints 107. Mobile App Reverse Engineering 108. Weak Mobile Authentication and Authorization
Het Mehta tweet media
English
1
53
181
8.9K
Er Pratik Panchal🐬 retweetledi
Intigriti
Intigriti@intigriti·
CORS misconfigurations are one of the most underestimated vulnerability types! 👀 If you're neglecting them... you're potentially missing out on high severity bugs! 🧐 In our latest article, we've outlined 8 different CORS exploitation scenarios—including some advanced & browser-specific cases! 😎 Read the article today! 👇 intigriti.com/researchers/bl…
Intigriti tweet media
English
3
34
151
8.2K
Er Pratik Panchal🐬 retweetledi
7h3h4ckv157
7h3h4ckv157@7h3h4ckv157·
AD Hacking resources (just sharing) Source: thehacker.recipes
English
1
48
235
9.4K
Er Pratik Panchal🐬 retweetledi
Ahmed Hamed 🇵🇸
Ahmed Hamed 🇵🇸@Ahmed78752911·
Bypassing Disabled Function via API Manipulation 1) Go to the source code, locate where the function is disabled: true, and change it to false. 2) Intercept the PUT request in Burp Suite. 3) Modify the request body (e.g., limit=1000000) and send it. #bugbountytips #bugbounty
Ahmed Hamed 🇵🇸 tweet media
English
5
18
257
9.9K
Er Pratik Panchal🐬 retweetledi
DarkShadow
DarkShadow@darkshadow2bd·
💥 GitLab Password Reset via Account Takeover Vulnerability paid $35,000 😬 Read the full POC on my telegram channel t.me/ShellSec/88
DarkShadow tweet media
English
2
32
403
17.8K
Er Pratik Panchal🐬 retweetledi
Het Mehta
Het Mehta@hetmehtaa·
CAPIE - Certified API Hacking Expert - Lesson material [WITH CERT OF COMPLETION]- 114 Lessons Link: thexssrat.podia.com/capie-lesson-m… Coupon Code: FEWSDVFVDSF
English
2
9
30
3K
Er Pratik Panchal🐬 retweetledi
ProjectDiscovery
ProjectDiscovery@pdiscoveryio·
Did you know you can set Proxify as an upstream proxy? Here's how you do it! 👇 Check out the change of User-Agent once the request is forwarded from Burp Suite to Proxify to the web server. #proxify #burpsuite #hackwithautomation
English
1
17
105
5.7K