Rajveer
@R4JVE3R
Followers
402
Following
3K
Media
53
Statuses
680
I turn HTTP requests into paychecks.
India
Joined January 2015
Thought: We created VS Code, open sourced it, and didn't become billionaires.
242
199
10K
I want to open devtools by default. Then scan all these URLS and if it hits an eval sink I want you to pause the devtools debugger. All done using AutoVader!
0
8
101
wappalyzer v0.1.15 adds 271 new fingerprints making the total 5964 🎉 github: https://t.co/iutjcGHGPT
2
44
232
Gemini can read such pixelated text?!!!!!!! THIS IS CRAZY.
10
21
169
How to bypass Cloudflare WAF? @FearsOff #bugbountytips #cloudflare #waf #bypass 1. Found an SQL injection but getting blocked by Cloudflare? Here's a pro tip 😏
14
173
850
IP whitelisting is fundamentally broken. At @assetnote, we've successfully bypassed network controls by routing traffic through a specific location (cloud provider, geo-location). Today, we're releasing Newtowner, to help test for this issue:
github.com
Abuse trust-boundaries to bypass firewalls and network controls - assetnote/newtowner
14
240
879
we are literally at "jailbreak yourself" rofl
65
141
3K
Take a look at my blog w/ @Bugcrowd where I talk about RCE and one of the ways it landed me a critical payout! https://t.co/iaqONivw4H
bugcrowd.com
I like to think of RCE not just as a bug but as an impact. Why? Because there are numerous ways—literally 1001—to achieve RCE. The initial foothold for an RCE attack can vary significantly, ranging...
10
65
309
XSStrike v3.1.5 is here🎉 This release focuses on fixing major bugs reported by the community. Github: https://t.co/kPTuLOPPbz
7
69
378
We recently looked deeper at the authentication bypass vulnerability in Next.js (CVE-2025-29927) and discovered some intelligent and comprehensive ways to check for the vulnerability. Read more in our blog post: https://t.co/f7f6VKzEcS
9
122
410
x-middleware-subrequest: true doesn't work
CVE-2025-29927 represents a critical security risk for Next.js applications. Authorization Bypass in Next.js Middleware. https://t.co/o9vLDcni6a
https://t.co/cV4YKocmD9
4
5
39
if i had the choice to be a cat i would be "cat /etc/passwd" :")
2
6
33
There’s a code base I audited about 3 years ago, and at the time, I was so certain that I wasn’t going to find any more bugs. There was a narrow minded view of what existed, and this severely limited what was possible.
4
20
163