sudhanshur705 Profile Banner
sudi Profile
sudi

@sudhanshur705

Followers
6K
Following
32K
Media
205
Statuses
3K

Remember, whatever happens... There's always a vulnerability https://t.co/FFVfnf39jY

India
Joined March 2015
Don't wanna be here? Send us removal request.
@sudhanshur705
sudi
4 months
Last year I found a XSS bug in Google IDX here's a detail writeup about it. Hope you will enjoy it's kinda lengthy :p Shoutouts to @MtnBer for finding the original bug in Gitlab and @kl_sree @sivaneshashok for the required chains to complete the exploit. https://t.co/L3e5rCrUuy
Tweet card summary image
sudistark.github.io
Technical breakdown of an XSS vulnerability in Google IDX Workstation.
13
86
368
@rauchg
Guillermo Rauch
10 hours
40
154
1K
@XssPayloads
XSS Payloads
2 days
Pwning OpenAI Atlas Browser, nice exploit starting with a postMessage XSS, by @S1r1u5_ and @sudhanshur705 https://t.co/Kshvwy2Uv4 Who said XSS is just about alert() popups ?
Tweet card summary image
hacktron.ai
A critical ChatGPT Atlas Browser vulnerability: XSS on an OpenAI subdomain let attackers hijack tabs, leak browsing URLs, and steal OAuth tokens.
0
9
40
@7urb01
turb0
13 days
The writeup for the first challenge is cool, but the first one existed just as a warm up for the actually cool tricks in the second one. Go solve it.
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
13 days
And here's an update on this XSS miniseries by @7urb01! Next week we'll have something even cooler, so GO HACK THIS! https://t.co/dsrqj8Bo2d
0
3
21
@sudhanshur705
sudi
5 days
One more to the list 🙇‍♂️ Learned about Mojo IPC calls this time, was tough compared to Comet browser as it was all internal. Hope you will like the blogpost ,tried to make it a little bit more detailed this time https://t.co/5acc9ngN36
Tweet card summary image
hacktron.ai
A critical ChatGPT Atlas Browser vulnerability: XSS on an OpenAI subdomain let attackers hijack tabs, leak browsing URLs, and steal OAuth tokens.
@S1r1u5_
s1r1us (mohan)
5 days
Part 3 of our Hacking AI Apps series. This time we hacked OpenAI Atlas Browser: A vulnerability that let us control tabs, leak browsing activity, and hijack your Reddit/Facebook accounts by stealing OAuth tokens. https://t.co/rhGzrfj5TW Stay tuned for Part 4: Antigravity!
4
6
45
@sudhanshur705
sudi
7 days
Has anyone from India have ordered pc build parts from these online vendors? I have to buy a motherboard, amazon is selling overprice(-10k diff). The listed ones have mixed reviews so not really sure whom to trust elitehub,variety,vedant... https://t.co/ZyfyaowkMj
3
0
11
@emgeekboy
Geekboy
10 days
New blog - documented our CVE research process - patch analysis, setting up debug environments across different stacks, and keeping research organized. https://t.co/tJ7EZb4d87
1
52
247
@nowaskyjr
Nowasky
11 days
If a closing tag doesn’t match </[A-Za-z] (e.g. </~), browsers enter the Bogus Comment state and ignore everything until the next >. <? does the same because of ancient PHP/XML compatibility. That means #XSS like these are possible: https://t.co/5Z93fakGbC
7
35
226
@valent1nee
Valentino Massaro
27 days
I'm really excited to share my first research article related to hacking Google Gemini! https://t.co/e7GcJuGLCb #bugSWAT #GoogleVRP
9
104
486
@rootxharsh
Harsh Jaiswal
13 days
You can now audit Chrome extensions for common bugs using the @HacktronAI CLI! hacktron --agent chrome_extension
@S1r1u5_
s1r1us (mohan)
13 days
We helped secure @perplexity_ai's comet browser from a critical vulnerability that could let attackers hijack the agent to exfiltrate local files, read emails, and bypass SOP. Read the full blog: https://t.co/Tj3gCOuDxE
0
1
51
@slonser_
slonser
13 days
Today I discovered an SQLi vulnerability in a PostgreSQL application where the injection point was path-based with strict length restriction (32 chars). Spaces, slashes, quotes, and parentheses e.t.c. resulted in a 400 Bad Request error and the path wasn't URL-decoded
2
30
260
@S1r1u5_
s1r1us (mohan)
13 days
We helped secure @perplexity_ai's comet browser from a critical vulnerability that could let attackers hijack the agent to exfiltrate local files, read emails, and bypass SOP. Read the full blog: https://t.co/Tj3gCOuDxE
2
32
174
@sudhanshur705
sudi
13 days
Thanks to @S1r1u5_ and AI my dream of finding such bugs in browsers coming to reality 😆. Check out the blogpost for details many more browsers on the line up as well.
@S1r1u5_
s1r1us (mohan)
13 days
We helped secure @perplexity_ai's comet browser from a critical vulnerability that could let attackers hijack the agent to exfiltrate local files, read emails, and bypass SOP. Read the full blog: https://t.co/Tj3gCOuDxE
0
5
53
@BourAbdelhadi
Bour Abdelhadi
13 days
Hey everyone! I’ve been building rep+, a lightweight HTTP Repeater inside Chrome DevTools. No proxy setup or certificates. Just open DevTools and start poking requests. It also has built-in AI for explanations and attack ideas. I’ll share one rep+ feature every day. Try it 👇
43
157
884
@ThisIsDK999
Debangshu 🇮🇳🥷
18 days
I talked a bit on BugBounties, Collaboration, AEMs and Burnout with @AseemShrey Go check it out! https://t.co/mEEc4scMlf
4
13
81
@nowaskyjr
Nowasky
13 days
HTML tag names must start with an ASCII letter. If they don’t… https://t.co/2aWlwx6FdI #xss
10
87
540
@S1r1u5_
s1r1us (mohan)
15 days
When I built the toy version, I gave it to Harsh and he started popping 0-days left and right and his work became strong data point for my AI pivot. He just published one of that research
@rootxharsh
Harsh Jaiswal
15 days
With only 48 hours remaining in a bug bounty event, I used @HacktronAI CLI to perform large-scale analysis of several JDBC drivers. Netting $85,000 in total rewards. This write-up shows how AI-assisted vulnerability research is speeding up the work of researchers and leading to
2
3
62
@dhakal_ananda
Ananda Dhakal
15 days
Really enjoyed presenting the talk “Catching WordPress 0-Days on the Fly” at DeepSec conference in Vienna 🔥
3
2
38
@rootxharsh
Harsh Jaiswal
15 days
With only 48 hours remaining in a bug bounty event, I used @HacktronAI CLI to perform large-scale analysis of several JDBC drivers. Netting $85,000 in total rewards. This write-up shows how AI-assisted vulnerability research is speeding up the work of researchers and leading to
12
80
339
@sudhanshur705
sudi
15 days
@pyn3rd In the end we had shell (I was asleep when this happened).@rootxharsh is so exceptionally good combining with @HacktronAI he becomes lethal but at the same time he works really hard as well !!
1
0
6