ShawarkOFFICIAL Profile Banner
Shawar Khan Profile
Shawar Khan

@ShawarkOFFICIAL

Followers
6K
Following
698
Media
264
Statuses
1K

Just a guy who breaks into web like a .357 bullet | Security Engineer at MyAlfred | @synackredteam | Synack Acropolis | Acknowledged by Top Tech Giants.

Joined July 2013
Don't wanna be here? Send us removal request.
@ShawarkOFFICIAL
Shawar Khan
5 years
New Write-up!. Achieving Remote code execution by exploiting variable check feature!.
Tweet media one
11
122
383
@ShawarkOFFICIAL
Shawar Khan
20 days
RT @Yass1nMohamed: I made a list of all my weird XSS Payloads so you all can just copy and paste it 🖤. #CyberSecur….
0
164
0
@grok
Grok
7 days
What do you want to know?.
609
388
3K
@ShawarkOFFICIAL
Shawar Khan
20 days
RT @DarkWebInformer: WPProbe: A fast and stealthy WordPress plugin enumeration tool. GitHub: • Uses REST API to de….
0
199
0
@ShawarkOFFICIAL
Shawar Khan
20 days
RT @cyb_detective: Filesec. Encyclopedia of file extensions. For each file, it indicates the types of attacks and platforms for which this….
0
40
0
@ShawarkOFFICIAL
Shawar Khan
2 months
A script written in python just to check the existence of a CVE-2025-0133 Reflected Cross-Site Scripting vulnerability that occurs in Palo Alto. The endpoint 'getconfig.esp' is detected and tested for XSS using the given script. Github:
Tweet card summary image
github.com
Contribute to shawarkhanethicalhacker/CVE-2025-0133-exploit development by creating an account on GitHub.
0
0
4
@ShawarkOFFICIAL
Shawar Khan
5 months
RT @harris0ft: I have had 8/10 success in Rate Limiting Bypass for sometime now.
Tweet media one
0
72
0
@ShawarkOFFICIAL
Shawar Khan
7 months
Always check for leaked JWTs for internal APIs. This can result in unauthorised access to APIs that return mass PII. In this case, the API leaked PII of 2637711 users. Bounty: $1000.@yeswehack
Tweet media one
Tweet media two
1
13
123
@ShawarkOFFICIAL
Shawar Khan
7 months
Just got a reward for a critical vulnerability submitted on @yeswehack -- Improper Access Control - Generic (CWE-284). #YesWeRHackers
Tweet media one
0
2
87
@ShawarkOFFICIAL
Shawar Khan
10 months
Synack Challenge Coins!.@synack @SynackRedTeam
Tweet media one
Tweet media two
2
1
69
@ShawarkOFFICIAL
Shawar Khan
10 months
New XSS Vector alert!. <style>.xss:hover {.transition: transform 0.1s;.transform: translateX(1px);.}.</style>. 1. <xss ontransitionend="alert(document.domain)">.2. <xss ontransitionstart="alert(document.domain)">.3. <xss ontransitionrun="alert(document.domain)">.
1
1
3
@ShawarkOFFICIAL
Shawar Khan
10 months
New XSS Vector alert!.POC: 1. <xss ontransitionend="alert(document.domain)">.2. <xss ontransitionstart="alert(document.domain)">.3. <xss ontransitionrun="alert(document.domain)">. See thread. #XSS #Cheatsheet #vector
Tweet media one
1
23
123
@ShawarkOFFICIAL
Shawar Khan
10 months
New XSS vector alert!. <input type=hidden oncontentvisibilityautostatechange=alert() style=content-visibility:auto>. Works on Chrome, No interaction required. Most firewalls don't filter this event handler. #XSS #Bypass #Cheatsheet.
1
2
8
@ShawarkOFFICIAL
Shawar Khan
1 year
Tweet media one
Tweet media two
Tweet media three
0
0
0
@ShawarkOFFICIAL
Shawar Khan
1 year
!! SCAM ALERT !!.Many people from my friends circle have received the following messages which states a failed delivery. Upon accessing the shortened URL a fake Pakistan Post website ending in *.xyz or *.cyou. The fake phishing websites asks for updated address and on the next
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
1
2
@ShawarkOFFICIAL
Shawar Khan
1 year
RT @coffinxp7: Effective way to crawl juicy endpoints with Katana 😎🤏🏻.happy hunting :)
Tweet media one
0
149
0
@ShawarkOFFICIAL
Shawar Khan
2 years
RT @joaxcar: Did a little writeup of the CSP bypass I reported to PortSwigger. It might be interesting to anyone who saw the disclosed repo….
Tweet card summary image
joaxcar.com
Portswigger just disclosed a report of mine over on HackerOne. It’s an unusual report in that the issue reported is purely a CSP bypass. I thought that I could provide a bit of context to the report...
0
95
0
@ShawarkOFFICIAL
Shawar Khan
2 years
RT @hackstacksec: Here are the OWASP Top 10 vulnerabilities for Large language model 🚨. Get your organisation secured..
0
8
0
@ShawarkOFFICIAL
Shawar Khan
2 years
RT @ynsmroztas: If you get a reverse shell on Ubuntu 18.04.x or can run remote code execution, you should definitely try this exploit on th….
0
76
0
@ShawarkOFFICIAL
Shawar Khan
2 years
RT @0day_exploit_: TOP RCE ( Remote code execution ). Thread 🧵:👇 Here is how to find RCE issues:. 1) We can find RCE from EXIF metadata im….
0
163
0