
Shebu
@_sh3bu
Followers
922
Following
13K
Media
209
Statuses
2K
Product Security @Philips | Masters in CyberSecurity @AMRITAedu https://t.co/z0UsaqFOJ0
India
Joined December 2020
RT @bountywriteups: Cybersecurity Training: Real-World Code Review Challenges on CodeVulnHunt. #bugbounty #bugbount….
0
2
0
RT @C0d36x110: Introducing CodeVulnHunt! 🚀 Sharpen your manual code review skills with real-world challenges and hands-on learning. Join th….
medium.com
Visit: CodeVulnHunt
0
1
0
CodeVulnHunt - A platform by my friend @C0d36x110 to enhance your code analysis skills. Do check it out !. Feel free to share your feedback and constructive opinions!. . #CyberSecurity #ctf #BugBounty #redteam.
1
1
2
RT @ProjectSEKAIctf: 🎁Monthly Giveaway🎁. Hack The Box 1-year VIP+ & 3-month Prolab.- Follow, Like, and Retweet to join!.- Winners will be p….
0
578
0
RT @nikhil_mitt: New year giveaway! I am giving away 1 seat each for @AlteredSecurity's upcoming Attacking and Defending AD (CRTP) and Atta….
0
322
0
RT @ctbbpodcast: Frans Rosen was on the pod last week and dropped some mind-bending X-Correlation Injection research on us. Including thes….
0
79
0
RT @ProjectSEKAIctf: 🎁 Monthly Giveaway 🎁 . Hack The Box 12-month VIP+ x1.- Follow, Like, and Retweet to join!.- Winner will be picked rand….
0
391
0
RT @Hac10101: Made a Youtube playlist "Introduction to GCP Pentesting", Hopefully it will help people to break into GCP Security : ) . http….
youtube.com
0
2
0
Completed Breaching AD network from Tryhackme ✅.
tryhackme.com
This network covers techniques and tools that can be used to acquire that first set of AD credentials that can then be used to enumerate AD.
0
0
7
RT @garethheyes: Everyone knows that the RFCs for email addresses are crazy. This post will show without doubt that you should not be follo….
portswigger.net
Some websites parse email addresses to extract the domain and infer which organisation the owner belongs to. This pattern makes email-address parser discrepancies critical. Predicting which domain an
0
155
0
RT @albinowax: The whitepaper is live! Listen to the whispers: web timing attacks that actually work. Read it here ->..
portswigger.net
Websites are riddled with timing oracles eager to divulge their innermost secrets. It's time we started listening to them. In this paper, I'll unleash novel attack concepts to coax out server secrets
0
177
0
RT @gregxsunday: Finding criticals is hard. Often, you can only target some users, need interaction or the impact isn't that high. However,….
0
27
0
RT @H4R3L: New blog! This time a high severity session takeover in Zoom worth $15,000. Read the story of how @sudhanshur705 , @BrunoModific….
nokline.github.io
Here you can read all about my research and techniques I’ve gathered over time!
0
127
0
Completed El-Bandito from @RealTryHackMe ✅.
tryhackme.com
Can you help capture El Bandito before he leaves the galaxy?
0
0
3