Harsh Jaiswal

3.2K posts

Harsh Jaiswal banner
Harsh Jaiswal

Harsh Jaiswal

@rootxharsh

Building @hacktronai | researching at @httpvoid0x2f | auditing at @cure53berlin | prev @zomato @vimeo @pdiscoveryio

Katılım Nisan 2015
1.2K Takip Edilen22.1K Takipçiler
Sabitlenmiş Tweet
Harsh Jaiswal
Harsh Jaiswal@rootxharsh·
AI-accelerated security isn’t the future, it’s already happening and it’s changing how we approach real vulnerability research. In our latest case study, we break down how we used Hacktron CLI - an internal tool that helped us hack faster and smarter to compress weeks of research into days. Today, we’re opening it up to security researchers, penetration testers, and developers. We’re excited to bring more people in. Join the waitlist: app.hacktron.ai/signup
s1r1us (mohan)@S1r1u5_

A case study of AI-accelerated hacking: How we at @HacktronAI hacked our way into Lovable's office, cut attack time from weeks to days, and helped secure Supabase from one of the most complex vulnerability chains we’ve ever worked through.

English
4
5
76
12.8K
ϻг_ϻε
ϻг_ϻε@steventseeley·
Omg this is so fun, I get to be a script kiddie again!
ϻг_ϻε tweet media
English
3
0
60
6.7K
Harsh Jaiswal retweetledi
Hacktron AI
Hacktron AI@HacktronAI·
Cloudflare built a Next.js replacement in a week with vibe-coding. We vibe-hacked and found numerous vulnerabilities, multiple critical and high severity. On Cloudflare Workers, one of the bugs leaks one user's session to another by default. hacktron.ai/blog/hacking-c…
English
19
42
452
106.5K
Harsh Jaiswal
Harsh Jaiswal@rootxharsh·
@S1r1u5_ Did you also notice getting an unrelated absurd response once in a blue moon?
English
1
0
0
760
s1r1us (mohan)
s1r1us (mohan)@S1r1u5_·
help: might be naive, does MoE affect model quality when batching different user requests? like on claude/openai they do continuous batching right, so multiple requests from completely different domains get loaded on same model weights on gpu, like a harvey user doing legal review, cursor user doing code completion, and hacktron user doing vulnerability research all in the same batch. how does the router pick the right expert here? is there a chance a vulnerability research token gets misrouted to a legal expert because of the batch composition? or does batching not affect routing at all?
English
3
0
8
1.9K
Harsh Jaiswal retweetledi
Yam Peleg
Yam Peleg@Yampeleg·
i'm tired boss
Yam Peleg tweet media
English
27
157
2.2K
78.6K
Nate
Nate@nnwakelam·
@rootxharsh Rawai / Nai Harn is nice. I can recommend you some saunas. Otherwise Bang Tao or Cherntalay. Try and get something as close to the beach as possible. For Krabi, it's fairly booked at the moment you probably will need a scooter for both locations.
English
1
0
1
435
Harsh Jaiswal
Harsh Jaiswal@rootxharsh·
Anyone have any recommendations for staying in Phuket and Krabi? Preferably- good internet, good evenings walks, beach not too far,
English
4
0
14
3.8K
Harsh Jaiswal
Harsh Jaiswal@rootxharsh·
The exploit for CVE-2026-1731 is out. The APT of CVE-2026-1281 missed a major target 😅. Props to watchTowr for the blog on it. The moment I read it, my instinct said there had to be a variant in remote support, given how heavily it relies on bash scripts. @HacktronAI did the rest. Literally gave me PoC in hand. (Vibe hacking?) What surprised me was that I didn’t know this bash quirk earlier, even though I’d already run into a similar quirk in another language. Consider this a reminder: read the blogs. Always.
Stephen Fewer@stephenfewer

We just published our @rapid7 analysis of CVE-2026-1731, a critical command injection affecting BeyondTrust Privileged Remote Access (PRA) & Remote Support (RS). Unauthenticated RCE, with a root cause due to Bash arithmetic evaluation. Analysis/PoC here: attackerkb.com/topics/jNMBccs…

English
1
13
97
14.8K
Harsh Jaiswal retweetledi
s1r1us (mohan)
s1r1us (mohan)@S1r1u5_·
CVE-2026-1731 Last night @rootxharsh and I were driving around Hyderabad, looking at office buildings and checking if we could RCE any of them. Every single building had a company we could potentially pwn.
s1r1us (mohan) tweet media
English
2
7
84
8.1K
Harsh Jaiswal retweetledi
Hacktron AI
Hacktron AI@HacktronAI·
We found a RCE in Google's AI code editor Antigravity - $10000 Bounty Link to the blog in comments:
Hacktron AI tweet media
English
17
97
568
66.5K
Harsh Jaiswal
Harsh Jaiswal@rootxharsh·
Found my most widespread 0-day RCE today, pretty much most of the Fortune 100. I wished to hack this target for a long time.
English
3
4
163
24.1K
Harsh Jaiswal retweetledi
Hacktron AI
Hacktron AI@HacktronAI·
🚨 CVE-2026-1731 🚨 Our team discovered a critical pre-auth RCE affecting BeyondTrust Remote Support & Privileged Remote Access. SaaS/Cloud instances have been patched. If you're running self-hosted deployments, apply the patches immediately. More info in the comments.
Hacktron AI tweet media
English
3
65
249
34.8K
Harsh Jaiswal
Harsh Jaiswal@rootxharsh·
how do people use MS teams? what a broken software. Claude code would write better than this slop.
English
0
0
8
1.5K
Harsh Jaiswal
Harsh Jaiswal@rootxharsh·
Huge respect for people who can lock in from anywhere, especially co work spaces wowork etc, i for whatever reason cant get things done there.
English
1
0
27
2.4K