nikhil(niks) (@niksthehacker) 's Twitter Profile
nikhil(niks)

@niksthehacker

@SynackRedTeam Legend | Lead Pentester @Cobalt_io | Founder @BSidesAhmedabad | Speaker @Blackhatmea @defcon | Board of Advisor @riskprofilerio

ID: 1353789944

calendar_today15-04-2013 08:00:49

3,3K Tweet

10,10K Followers

1,1K Following

Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

nikhil(niks) used the built-in screenshot generation to trigger SSRF and redirected the target to a crafted domain that captured internal data as a screenshot. 👉 youtu.be/Ol4Ym9TcBEQ #BugBounty #BBV #DEFCON #AWS #SSRF

nikhil(niks) (@niksthehacker) 's Twitter Profile Photo

🚨 Calling all women in cybersecurity! ✈️🏨 We are sponsoring flights and accommodation for selected participants to attend Security BSides Ahmedabad! Apply now and be part of an incredible community.

shubs (@infosec_au) 's Twitter Profile Photo

IP whitelisting is fundamentally broken. At Assetnote, we've successfully bypassed network controls by routing traffic through a specific location (cloud provider, geo-location). Today, we're releasing Newtowner, to help test for this issue: github.com/assetnote/newt…

Security BSides Ahmedabad (@bsidesahmedabad) 's Twitter Profile Photo

🚨 National Cyber Backbone— LIVE & LOUD @ BSides Ahmedabad 🚨 Not a drill. Not a test. This is cybersecurity history in the making. 🧠⚔️ We’re beyond proud to announce our KEYNOTE SPEAKER : 🎙️ Dr. Amit Sharma Additional Director General & Advisor (Cyber), DRDO India’s cyber

🚨 National Cyber Backbone— LIVE & LOUD @ BSides Ahmedabad 🚨

Not a drill. Not a test. This is cybersecurity history in the making. 🧠⚔️

We’re beyond proud to announce our KEYNOTE SPEAKER :

🎙️ Dr. Amit Sharma
Additional Director General & Advisor (Cyber), DRDO

India’s cyber
Alex Moshkov (@amoshkov) 's Twitter Profile Photo

🟥 CFP live — Positive Hack Talks, Jakarta 🇮🇩, July 23 → cfp.phdays.com/phtalks-jakart… Hackers, defenders, bug hunters, researchers — submit your talk. ✅ Flights & hotel covered. Our 5th #PHTalks — always hits hard. Free community-driven event. 250+ infosec pros.

🟥 CFP live — Positive Hack Talks, Jakarta 🇮🇩, July 23

→ cfp.phdays.com/phtalks-jakart…

Hackers, defenders, bug hunters, researchers — submit your talk. ✅ Flights & hotel covered.

Our 5th #PHTalks — always hits hard. Free community-driven event. 250+ infosec pros.
Security BSides Ahmedabad (@bsidesahmedabad) 's Twitter Profile Photo

1 Click. 0 Warnings. Infinite Regret. 😵‍💫 What if your mic, cam & location got hijacked without a single alert? Yeah… Armaan Pathan isn’t here to scare you — he’s here to show you how it’s done. 🧠💻 🎯 Tech Talk: "1 Click, 0 Warnings: Hijacking mic, camera & geolocation via

1 Click. 0 Warnings. Infinite Regret. 😵‍💫

What if your mic, cam & location got hijacked without a single alert?
Yeah… Armaan Pathan isn’t here to scare you — he’s here to show you how it’s done. 🧠💻

🎯 Tech Talk:
"1 Click, 0 Warnings: Hijacking mic, camera & geolocation via
Security BSides Ahmedabad (@bsidesahmedabad) 's Twitter Profile Photo

Ever felt like your attack surface has more edges than your Monday anxiety? Yeah… same. 😮‍💨 But what if someone could decode that chaos for you? 🎤 Enter Aditya A, Threat Research Lead at Safe Security, bringing the 🔥 with 🛡️ “Perimeter Assessment in the Age of Digital Sprawl”

Ever felt like your attack surface has more edges than your Monday anxiety?
Yeah… same. 😮‍💨

But what if someone could decode that chaos for you?

🎤 Enter Aditya A,
Threat Research Lead at Safe Security,
bringing the 🔥 with
🛡️ “Perimeter Assessment in the Age of Digital Sprawl”
Security BSides Ahmedabad (@bsidesahmedabad) 's Twitter Profile Photo

🕵️‍♂️ Think you're untraceable online? Think again. Public leaks are spilling more than just secrets — they’re blowing entire APT covers. 💥 Say hello to zhassulan zhussupov, Researcher & Development Scientist at Butterfly Effect Company, who's about to take us on a digital manhunt like

🕵️‍♂️ Think you're untraceable online? Think again.
Public leaks are spilling more than just secrets — they’re blowing entire APT covers. 💥

Say hello to <a href="/cocomelonckz/">zhassulan zhussupov</a>, Researcher &amp; Development Scientist at Butterfly Effect Company, who's about to take us on a digital manhunt like
shubs (@infosec_au) 's Twitter Profile Photo

How do we turn bad SSRF (blind) into good SSRF (full response)? The Assetnote Security Research team at Searchlight Cyber used a novel technique involving HTTP redirect loops and incremental status codes that leaked the full HTTP resp. It may work elsewhere! slcyber.io/assetnote-secu…

How do we turn bad SSRF (blind) into good SSRF (full response)? The <a href="/assetnote/">Assetnote</a> Security Research team at <a href="/SLCyberSec/">Searchlight Cyber</a> used a novel technique involving HTTP redirect loops and incremental status codes that leaked the full HTTP resp. It may work elsewhere! slcyber.io/assetnote-secu…
Security BSides Ahmedabad (@bsidesahmedabad) 's Twitter Profile Photo

👏Badge game Strong 💪 We’re thrilled to welcome Synack Red Team as the Official Badge Sponsor of BSides Ahmedabad 0x6! 🛡️✨ A name trusted in crowdsourced security, now backing the Finest Cyber Security Conference Around — right where innovation, talent, and community collide.

👏Badge game Strong 💪 

We’re thrilled to welcome <a href="/SynackRedTeam/">Synack Red Team</a> as the Official Badge Sponsor of BSides Ahmedabad 0x6! 🛡️✨

A name trusted in crowdsourced security, now backing the Finest Cyber Security Conference Around — right where innovation, talent, and community collide.
l33tdawg (@l33tdawg) 's Twitter Profile Photo

After 9 months+ of cranking, cursing, and cursoring, and drawing on over 20 years experience running #HITB's Call for Papers, I bring you CFP Directory - a single system to make it easier for speakers to submit and organizers to connect and curate talks: cfp.directory

shubs (@infosec_au) 's Twitter Profile Photo

Whenever I audit C# code, I look for benign file operations such as File.Exists(), especially if there's a preceding Path.Combine(). Read about how we leaked NTLM hashes pre-authentication in DotNetNuke (CVE-2025-52488) due to a perfect storm of issues. slcyber.io/assetnote-secu…

Whenever I audit C# code, I look for benign file operations such as File.Exists(), especially if there's a preceding Path.Combine(). Read about how we leaked NTLM hashes pre-authentication in DotNetNuke (CVE-2025-52488) due to a perfect storm of issues. slcyber.io/assetnote-secu…
André Baptista (@0xacb) 's Twitter Profile Photo

DMARC can reveal more domains associated with a target. dmarc.live/info/<target-domain> allows you to find domains using the same DMARC record. Check it out 👇 There's also a python tool: github.com/Tedixx/dmarc-s…

Security BSides Ahmedabad (@bsidesahmedabad) 's Twitter Profile Photo

🚜 From tractors to threat intel — this keynote hits different. We’re excited to welcome Carl Kubalsky, Director & Deputy CISO at John Deere USA , as a keynote speaker at BSides Ahmedabad 0x06! Carl brings real-world insights from the frontlines of industrial cybersecurity —

🚜 From tractors to threat intel — this keynote hits different.

We’re excited to welcome Carl Kubalsky, Director &amp; Deputy CISO at <a href="/JohnDeere/">John Deere USA</a> , as a keynote speaker at BSides Ahmedabad 0x06!

Carl brings real-world insights from the frontlines of industrial cybersecurity —