Prateek Thakare ๐Ÿ‡ฎ๐Ÿ‡ณ Profile
Prateek Thakare ๐Ÿ‡ฎ๐Ÿ‡ณ

@thakare_prateek

Followers
2K
Following
4K
Media
25
Statuses
761

Security Engineer | Synack Red Team member

Pune, India
Joined July 2018
Don't wanna be here? Send us removal request.
@thakare_prateek
Prateek Thakare ๐Ÿ‡ฎ๐Ÿ‡ณ
2 years
It was a great experience speaking at @THREAT_CON. Thanks for inviting us and giving us the opportunity to share our knowledge. Hats off to the hospitality we received from the organizing committee. Also thanks a lot for the special memento.
3
1
28
@S1r1u5_
s1r1us (mohan)
1 month
A few months ago, @rootxharsh and I gave a talk, sharing the slides here in case theyโ€™re helpful to anyone.
4
45
313
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
3 months
We announced the Critical Research Lab this week. And for our FIRST post, we got @J0R1AN's: - Exploiting Web Worker XSS with Blobs Go check it out!
lab.ctbb.show
Ways to turn XSS in a Web Worker into full XSS, covering known tricks and a new generic exploit using Blob URLs with the Drag and Drop API
1
50
218
@thakare_prateek
Prateek Thakare ๐Ÿ‡ฎ๐Ÿ‡ณ
3 months
Hiding these cool stickers from @sumgr0 ๐Ÿ˜†
0
0
13
@thakare_prateek
Prateek Thakare ๐Ÿ‡ฎ๐Ÿ‡ณ
3 months
It was a nice experience delivering training @bsidesahmedabad with @igauravbhosale ๐Ÿฅณ
@bsidesahmedabad
Security BSides Ahmedabad
3 months
โœจ You know what makes us the happiest? Seeing those bRiGhT, HaPpY faces at BSides Ahmedabad! ๐Ÿ˜ Training Day-2 is in full swing & the energy is just contagious โ€“ learning, networking & fun all around. ๐ŸŒŸ #BSidesAhmedabad #TrainingDay2 #HackLearnGrow #infosec #cybersecurity
0
1
7
@rez0__
Joseph Thacker
4 months
i get asked all the time how to be an ai hacker. go read my "how to hack ai apps" post then just read and understand every post on embracethered[.]com by @wunderwuzzi23 and you will be an expert AI hacker. im not joking. it's that simple. links below.
11
51
346
@infosec_au
shubs
4 months
The @SLCyberSec research team is releasing our final research post for our Christmas in July efforts, two RCEs and one XXE (all pre-auth) in Adobe Experience Manager Forms. One of the RCEs and the XXE still do not have official patches:
Tweet card summary image
slcyber.io
Vulnerabilities in AEM Forms The Searchlight Cyber Research Team discovered and disclosed three critical vulnerabilities in Adobe Experience Manager Forms to Adobe in late April 2025. As of writing...
7
64
228
@l33tdawg
l33tdawg
5 months
Added a new Past Talks feature to #CFPDirectory that allows you to search for past presentations added by speakers complete with download links to the materials and video if available... Check it out
cfp.directory
Find talks, presentations, and keynotes from speakers in our directory. Discover presentation materials, recordings, and slides from conferences worldwide.
0
7
9
@l33tdawg
l33tdawg
5 months
After 9 months+ of cranking, cursing, and cursoring, and drawing on over 20 years experience running #HITB's Call for Papers, I bring you CFP Directory - a single system to make it easier for speakers to submit and organizers to connect and curate talks:
Tweet card summary image
cfp.directory
Connect speakers with conferences worldwide. Discover open CFPs, submit talks, and grow your speaking career.
6
36
73
@EchoesOfAries
EchoesOfAries
6 months
Shocked to find severe battery acid damage in my Hyundai Creta 2023. Acid leaked onto the gear shifter cable and nearby parts, causing a breakdown. No proper drainage near the engine, feels like a serious safety oversight, please look into this. @HyundaiIndia @Hyundai_Global
2
5
5
@t0xodile
Thomas Stacey
7 months
Thrilled to finally release my latest research "The Single-Packet Shovel: Digging for Desync-Powered Request Tunnelling". Desync vulnerabilities stemming from HP2 downgrading continue to plague even the largest vendors, have a read to find out more! https://t.co/Elsr3WEYXZ
assured.se
In this paper I will reveal the discovery of wide-spread cases of request tunnelling in applications powered by popular servers including IIS, Azure Front Door and AWS' application load balancer...
3
46
142
@Yogehi
Ken Gannon (ไผŠ่—ค ๅ‰ฃ)
7 months
Apparently @offensive_con worked their asses off to get their talks up on YouTube Go check them out And here's the coolest talk, my talk: https://t.co/d3Vvo5UPrp And with that, the full chain used to exploit the S24 is released. Yay!
@offensive_con
offensivecon
7 months
4
33
158
@thakare_prateek
Prateek Thakare ๐Ÿ‡ฎ๐Ÿ‡ณ
9 months
This ๐Ÿ’ฏ
@S1r1u5_
s1r1us (mohan)
9 months
agree with sean here, and thatโ€™s why you should start doing ctfs or reversing vulnerabilities. you open a basic binary challenge in picoctf. but you never took any courses. it looks completely alien. you have no clue where to start. something in you wants you to solve it, for
0
0
1
@LiveOverflow
LiveOverflow ๐Ÿ”ด
10 months
I guess somebody was thinking outside... the... sand... box! "Compromised renderer can control your mouse and escape sbx" https://t.co/8OWneoaTKi
4
30
197
@GodfatherOrwa
Godfather Orwa ๐Ÿ‡ฏ๐Ÿ‡ด
11 months
Hello everyone โ™ฅ a little bit write-up of #bugbountytip #bugbountytips I am going to write here ..... Title: getting unauthorized access on 3rd party's/workspaces & and building your checklist for quickly locating bugs there via massive recon we know that its helpful to look
41
342
1K
@sudhanshur705
sudi
1 year
A small writeup from my side also, solved it after the deadline was over ๐Ÿ˜… Also I moved all my blogs in one place GitHub Pages so you can find everything at one place now: https://t.co/gSzWQ65fNO
sudistark.github.io
This was really an interesting xss challenge by @J0R1AN. I solved this challenge after the challenge deadline was over but still wanted to do a blogpost cause why not :p
@intigriti
Intigriti
1 year
โฐ Intigriti's December Challenge is over! ๐ŸŽ… โœ… 15 hackers found the correct solution ๐Ÿ“‘ 4 hackers wrote a cool writeup ๐Ÿ† Check out the winners below and drop your write-up in the comments!
2
13
60
@S1r1u5_
s1r1us (mohan)
1 year
Imagine opening a Discord message and suddenly your computer is hacked. We discovered a bug that made this possible and earned a $5,000 bounty for it. Here's the story and a beginner-friendly deep dive into V8 exploit development. Watch: https://t.co/QtAro4fj4t
17
179
739