Mahesh Bheema (@0xmahesh) 's Twitter Profile
Mahesh Bheema

@0xmahesh

Security Enthusiast | OSCP | OSWP | Null Hyderabad Chapter Lead

ID: 190786633

calendar_today14-09-2010 20:54:53

330 Tweet

558 Followers

432 Following

Anton (@therceman) 's Twitter Profile Photo

Bug Bounty Hint If you have found that server is running PHP - you can try to test it for RCE vulnerability. Append following header to request: User-Agentt: zerodiumsystem("id") If PHP version is vulnerable - you will execute system("id") command on a server.

Bug Bounty Hint

If you have found that server is running PHP - you can try to test it for RCE vulnerability.

Append following header to request:
User-Agentt: zerodiumsystem("id")

If PHP version is vulnerable - you will execute system("id") command on a server.
Nicky (@nickieyey) 's Twitter Profile Photo

I have compiled a list of Best Cybersecurity Youtube Channels, that talk about various topics related to cybersecurity. Do check it out 👇 Here is the link to the Github repository: github.com/Nickyie/Cybers… #Pentesting #CyberSec #cyberawarness #bugbounty #infosec #bugbounty

I have compiled a list of Best Cybersecurity Youtube Channels, that talk about various topics related to cybersecurity. Do check it out 👇

Here is the link to the Github repository: github.com/Nickyie/Cybers…

#Pentesting #CyberSec #cyberawarness #bugbounty #infosec #bugbounty
Pavan (@pavanw3b) 's Twitter Profile Photo

Some pics from NULL Hyderabad July meet. Talks: News Bytes by Karan Cloud Security & S3 by Aravind V Cloud Security Zero to One by Ravi Teja Intro to Threat Hunting by Donny Venue sponsor: ServiceNow #nullHyd #InfoSec null - The Open Security Community

Some pics from <a href="/nullhyd/">NULL Hyderabad</a> July meet.

Talks:
News Bytes by Karan
Cloud Security &amp; S3 by <a href="/Aravind_JMA/">Aravind V</a> 
Cloud Security Zero to One by Ravi Teja
Intro to Threat Hunting by <a href="/dmred1/">Donny</a> 

Venue sponsor: <a href="/ServiceNow/">ServiceNow</a> 

#nullHyd #InfoSec <a href="/null0x00/">null - The Open Security Community</a>
vx-underground (@vxunderground) 's Twitter Profile Photo

The individual who breached Rockstar Games states they got initial access by social engineering an employee. They are currently on 4chan sharing material and chatting. boards.4channel.org/v/thread/61249…

Rio (@0x09al) 's Twitter Profile Photo

After an unhealthy amount of hours put into this, I finally managed to get RCE on Cobalt Strike. I would recommend avoiding it for a while as CVE-2022-39197 is not sufficient.

After an unhealthy amount of hours put into this, I finally managed to get RCE on Cobalt Strike. I would recommend avoiding it for a while as CVE-2022-39197 is not sufficient.
Het Mehta (@hetmehtaa) 's Twitter Profile Photo

Accidental $70,000 Google Pixel Lock Screen Bypass >bugs.xdavidhu.me/google/2022/11… Video PoC: youtu.be/dSgSnYPgzT0 #TheSecureEdge #Hacking #Google #bugbounty #cybersecurity

Intigriti (@intigriti) 's Twitter Profile Photo

Learning from others is amazing, but how do you find the content you're looking for? payloadartist solved that problem by creating the Bug Bounty Hunting Search Engine! hubs.li/Q01B0C100 #bugbounty #bugbountytips 👇

Learning from others is amazing, but how do you find the content you're looking for?

<a href="/payloadartist/">payloadartist</a> solved that problem by creating the Bug Bounty Hunting Search Engine!
hubs.li/Q01B0C100

#bugbounty #bugbountytips 👇
Hilarex (@_hilarex) 's Twitter Profile Photo

Automatically configure a vulnerable Active Directory network on AWS : - 6 VMs - 1 linux server with GLPI - 3 domains Perfect to share a vulnerable lab with other people #activedirectory #aws #pentest #ad #LordOfTheRings github.com/0xBallpoint/LO…

MDSec (@mdseclabs) 's Twitter Profile Photo

We've just published a quick write up on CVE-2023-23397, which allows a remote adversary to leak NetNTLMv2 hashes: mdsec.co.uk/2023/03/exploi… by Dominic Chell 👻

We've just published a quick write up on CVE-2023-23397, which allows a remote adversary to leak NetNTLMv2 hashes: mdsec.co.uk/2023/03/exploi… by <a href="/domchell/">Dominic Chell 👻</a>
Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

In this video walkthrough, we break down the basic info of CVE-2023-23397 the zero-day, zero-touch vulnerability that was rated 9.8 on the #CVSS scale. Follow this thread as we detail the general exploitation routine of this #vulnerability. research.trendmicro.com/cve202323397

Abhay Bhargav (@abhaybhargav) 's Twitter Profile Photo

🛠️ These are my go-to #DevSecOps tools at all stages of the DevSecOps lifecycle. These are all OSS (not paid tools) so you wont spend a $ buying them