
animesh
@an1msh_
Followers
831
Following
8K
Media
29
Statuses
749
Security Consultant @TantoSecurity 🥷 🇳🇵 🇦🇺
Joined July 2017
Thanks a lot to @infosec_au for inspiring me to look at t-mobile's program. I dont think im looking anywhere else from here on. I earned $12,000 for my submission on @bugcrowd #ItTakesACrowd.
5
3
117
RT @garethheyes: I discovered how to use CSS to steal attribute data without selectors and stylesheet imports! This means you can now explo….
0
85
0
RT @0xacb: Time to reveal what I was doing with @0xteknogeek back in '19. All the hard work and sleepless nights have paid off! https://t.….
0
15
0
RT @0xAsm0d3us: @hetmehtaa If you want to be in the top 10%, follow the above, if you want to be in the top 0.1%, play quality CTFs. CTFs w….
0
4
0
RT @TantoSecurity: 🚆🚄🚅🚉🛤️🚃🚂.Training Alert! . We are partnering with @corelanc0d3r to bring his amazing exploit dev workshop to Melbourne f….
events.humanitix.com
Taught by Peter “corelanc0d3r” Van Eeckhoutte (Corelan), in partnership with Tanto Security, we bring you 2 of the most sought-after exploit development courses
0
5
0
RT @ArmanSameer95: Believe me when I say this: The universe is absolutely giving. Give your best, and you'll receive it. Just give your a….
0
2
0
RT @pentest_swissky: Sleepless Strings - Template Injection in Insomnia - @TantoSecurity.
tantosec.com
A Template Injection vulnerability in the latest version of Kong's Insomnia API Client leads to Remote Code Execution.
0
13
0
RT @infosec_au: Today, we're releasing the new Searchlight Cyber (@SLCyberSec) tools website, which allows you to use several of our open-s….
0
78
0
RT @busf4ctor: I completed my second week as a full-time hunter. It's hard, but having @Rhynorater, @xssdoctor, @un1tycyb3r by your side ma….
0
5
0
RT @BSidesCbr: KEYNOTE: Not All Vulnerabilities Are The Same.10 years ago, @infosec_au spoke at the first BSidesCbr. Now Australia’s top b….
cfp.bsidescbr.com.au
Over the past seven years, I've had the privilege of building and leading a security research team in Australia, with a focus on web security research, particularly in the context of enterprise...
0
13
0
Look forward to sharing my journey so far :).
"Navigating Bug Bounties: From NAs to P1s".Animesh Acharya shares the real story behind the stats, the quiet lessons between frustration and breakthrough. For anyone stuck, starting out, or seeking practical tips to level up their bug bounty game.
1
1
15
RT @BSidesCbr: "Catching WordPress 0-Days on the Fly".What if you could spot WordPress plugin vulns the moment devs push code? Ananda Dhaka….
cfp.bsidescbr.com.au
WordPress powers over 40% of the web, making its plugin ecosystem a prime target for attackers. While security researchers manually audit plugins for vulnerabilities, the ever-growing number of...
0
3
0
RT @irsdl: I have launched YSoNet ( and added #SharePoint CVE-2025-49704 payload generator to it as the first thing….
github.com
Deserialization payload generator for a variety of .NET formatters - irsdl/ysonet
0
124
0
RT @infosec_au: For our third installment of Christmas in July, the @SLCyberSec Research Team is disclosing a critical authentication bypas….
slcyber.io
Note: In correspondence with Hexagon while disclosing the bugs below, they informed us that any sharing of source code would be considered a violation of their terms and license. The Java code has...
0
26
0