Aditya Dixit

2.6K posts

Aditya Dixit banner
Aditya Dixit

Aditya Dixit

@zombie007o

Research Lead at CredShields | Pentest Team Lead at Cobalt and HackerOne | OSCP | AWS Sec | Tweets about security in Web2 and Web3.

India Katılım Temmuz 2017
926 Takip Edilen1.3K Takipçiler
Sabitlenmiş Tweet
Aditya Dixit
Aditya Dixit@zombie007o·
You must have seen some mobile apps sending encrypted traffic/data in the POST body. Want to know how it can be manipulated? I just wrote a blog about one such case where I was able to break client-side AES in an Android app using 3 chained proxies blog.dixitaditya.com/breaking-aes-t…
English
5
28
75
0
Aditya Dixit retweetledi
vx-underground
vx-underground@vxunderground·
Good news everyone Shai-Hulud, that spoopy Git worm thingy everyones been yapping about, has been open-sourced. What does this mean? TeamPCP, or someone else, has released the fully weaponized worm for you. github.com/hmoreirar/Shai…
English
81
268
2.4K
275.3K
Aditya Dixit retweetledi
Bad Sector Labs
Bad Sector Labs@badsectorlabs·
CopyFail (CVE-2026-31431) in Go. In case you want to get root from a static binary without Python as a dependency. github.com/badsectorlabs/…
Bad Sector Labs tweet media
English
16
227
1.1K
77.5K
Aditya Dixit retweetledi
vx-underground
vx-underground@vxunderground·
CVE-2026-31431 a/k/a CopyFail > Linux LPE > Description sounds like AI slop > Exploit is legit > Impacts every Linux kernel from 2017 - Now > Proof-of-concept released > It's Wednesday? copy.fail
English
102
542
3.7K
259.2K
Aditya Dixit retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨 BREAKING: cPanel and WHM, the control panels behind an estimated 70+ million websites, have a critical security flaw that lets anyone become root admin without a password. CVE-2026-41940 affects every supported version. It’s already being exploited in the wild. watchTowr Labs published the full attack today, after the hosting company KnownHost confirmed the bug was already being used to break into a significant chunk of the internet. If you've never heard of cPanel: it's the dashboard that hosting providers and millions of website owners use to manage their servers, domains, email accounts, databases, and SSL certificates. WHM is the admin version that controls the entire server. If someone gets root access to WHM, they get the keys to the kingdom and to every apartment inside it. How the attack works, in plain English: 🔴 Step 1: The attacker sends a deliberately wrong login. cPanel still creates a temporary "you tried to log in" record on disk and gives the attacker a cookie tied to it. 🔴 Step 2: The attacker tweaks the cookie to disable cPanel's password encryption. Normally cPanel encrypts the password field on disk. With one small change to the cookie, cPanel just stores it as plain text instead. 🔴 Step 3: The attacker sends a fake login attempt where the password field secretly contains hidden line breaks. cPanel does not strip these line breaks out, so they get written straight to the session file. Each line break creates a brand new fake record. The attacker uses this to inject lines that say "this user is root" and "this user already authenticated successfully." 🔴 Step 4: The attacker visits one more random page on the site to nudge cPanel into re-reading the file. cPanel then promotes the injected fake lines into its main session memory. 🔴 Step 5: On the next request, cPanel sees a flag that says "this user already passed the password check." cPanel trusts that flag, skips checking the actual password, and lets the attacker in as root. From start to finish, the attack takes a handful of HTTP requests. If you run cPanel or WHM, the patched versions are: 🔴 cPanel/WHM 110.0.x → 11.110.0.97 🔴 cPanel/WHM 118.0.x → 11.118.0.63 🔴 cPanel/WHM 126.0.x → 11.126.0.54 🔴 cPanel/WHM 132.0.x → 11.132.0.29 🔴 cPanel/WHM 134.0.x → 11.134.0.20 🔴 cPanel/WHM 136.0.x → 11.136.0.5 If your version is older than these, assume someone has already broken in and act accordingly. Patch right now, then rotate every password and key the server touched: root passwords, API tokens, SSL private keys, SSH keys, mail passwords, and database passwords.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
105
789
3.9K
556.4K
Aditya Dixit retweetledi
impulsive
impulsive@weezerOSINT·
every public Notion page is leaking the email addresses of everyone who edited it. zero authentication. no cookies. no tokens. one POST request returns full names, emails, and profile photos for every editor on the page. your company wiki is public? every employee's email is exposed. right now. reported in 2022. still works in 2026. like what is the point of even having a BBP thread
impulsive tweet mediaimpulsive tweet mediaimpulsive tweet media
English
68
249
3.3K
434.5K
Aditya Dixit retweetledi
impulsive
impulsive@weezerOSINT·
Lovable has a mass data breach affecting every project created before november 2025. I made a lovable account today and was able to access another users source code, database credentials, AI chat histories, and customer data are all readable by any free account. nvidia, microsoft, uber, and spotify employees all have accounts. the bug was reported 48 days ago. its not fixed. They marked it as duplicate and left it open.
impulsive tweet mediaimpulsive tweet mediaimpulsive tweet media
English
268
721
5.7K
1.4M
Aditya Dixit retweetledi
Alex
Alex@DiffeKey·
Vercel has reportedly been breached by ShinyHunters. As of now, nobody else appears to be posting about this, so I’m sharing what I have. Here is the information I’ve gathered, along with screenshots provided by ShinyHunters. #cybernews #shinyhunters #breach #vercel #news
Alex tweet mediaAlex tweet mediaAlex tweet mediaAlex tweet media
English
61
153
900
643.7K
Aditya Dixit retweetledi
johnny
johnny@zeroxjf·
Finally got this virtual iPhone running iOS 26.1 up and running on macOS. It's jailbroken and going to help with security research a ton. Big thank you to @wh1te4ever for this. This is not for the average user and is complicated to set up. Highly recommend Codex and/or Claude to assist. For those interested, the project is here: github.com/wh1te4ever/sup… And the writeup is here: github.com/wh1te4ever/sup…
johnny tweet media
English
60
240
2.1K
134.1K
Aditya Dixit retweetledi
SolidityScan
SolidityScan@SolidityScan·
Smart contracts don’t fail randomly. They fail in patterns. The OWASP Smart Contract Top 10 defines those patterns. Use the Top 10 to > Threat-model before you ship > Lock down privilege and upgrade paths > Encode invariants as tests > Secure every external boundary
English
5
35
64
2.4K
Aditya Dixit retweetledi
SolidityScan
SolidityScan@SolidityScan·
if you deploy smart contracts without doing this…you’re just hoping nothing breaks. Watch before one bug costs you everything.
English
9
8
60
2.2K
Aditya Dixit retweetledi
Intigriti
Intigriti@intigriti·
Want to quickly scan code bases for security vulnerabilities? This AI-backed tool helps you scan for vulnerabilities using Claude AI Agents to scan your entire project for all vulnerability types with support for multiple programming languages! 🤠 Check it out! github.com/anshumanbh/sec…
Intigriti tweet media
English
4
48
258
20.4K
Aditya Dixit retweetledi
CredShields
CredShields@CredShields·
H1 2025: More than $2.5B Lost! From Bybit’s $1.45B breach to Sui’s largest DeFi exploit, our latest State of Web3 Security Report breaks down the top hacks and root causes, impact across chains and vectors, and how to stay secure. Download the full report to get the findings.
English
12
33
95
16.9K
Aditya Dixit retweetledi
Akshansh Jaiswal
Akshansh Jaiswal@Akshanshjaiswl·
We had an amazing time at the @Hacker0x01 Bangalore Bug Bounty Talks 🎯 Thanks to Alfin, @rohitcoder @cyberboyIndia, and @zombie007o for the incredible sessions on HTML Sanitizer Bypasses, Supply Chain Attacks, and Web3 Security. 🛡️ Grateful to everyone who joined — see you at the next one! 🚀 #BugBounty
Akshansh Jaiswal tweet mediaAkshansh Jaiswal tweet mediaAkshansh Jaiswal tweet mediaAkshansh Jaiswal tweet media
English
1
4
51
2.6K
Aditya Dixit retweetledi
SolidityScan
SolidityScan@SolidityScan·
Alice created a contract to allow users to claim USDT tokens. Can you spot the bug? Take on the #FindTheBug challenge and showcase your debugging expertise! #BugHunt #SmartContracts #Web3
SolidityScan tweet media
English
5
5
19
1.3K
Aditya Dixit retweetledi
Lorenz Lehmann
Lorenz Lehmann@LehmannLorenz·
Today, my PC was nearly compromised. With just one click, I installed a malicious @code extension. Luckily, I was saved as my PC doesn't run on Windows. Hackers are getting smarter and aren't just targeting beginners. Here's how they do it and how you can protect your coins!
Lorenz Lehmann tweet mediaLorenz Lehmann tweet mediaLorenz Lehmann tweet media
English
203
1.7K
10.2K
2.5M