Rishi
banner
rxerium.com
Rishi
@rxerium.com
14 followers 5 following 46 posts
Senior Cyber Analyst || OWASP member || Project Discovery Ambassador || UK OSINT Officer || Purple Teamer || Privacy Advocate || Signal: @rxerium.02
Posts Media Videos Starter Packs
🚨 Active Exploitation of Gladinet CentreStack and Triofox Local File Inclusion Flaw (CVE-2025-11371)

I've created a vulnerability detection script here: github.com/rxerium/CVE-...

As reported by Huntress this is an unauthenticated Local File Inclusion flaw in Gladinet CentreStack and Triofox.
Here is the current exposure for E-Business Suite (via Shodan):
shodan.io/search?query...
shodan.io
Patches are available as per Oracle's Security Advisory:
oracle.com/security-ale...
oracle.com
🚨 Critical zero-day tagged as CVE-2025-61882 (CVSS 9.8) affecting Oracle E-Business Suite

I've created a vulnerability detection script here:
github.com/rxerium/CVE-...

This vulnerability is remotely exploitable without authentication.
GitHub - rxerium/CVE-2025-61882: Detection for CVE-2025-61882
Detection for CVE-2025-61882. Contribute to rxerium/CVE-2025-61882 development by creating an account on GitHub.
github.com
Rishi @rxerium.com · Sep 23
Solarwinds critical vuln - CVE-2025-26399

"Given SolarWinds’ past, in-the-wild exploitation is highly likely" as being reported by WatchTowr Labs

I've created a detection script for this vuln:
github.com/rxerium/CVE-...

128 currently vulnerable across 22 countries / 90 cities:
github.com
Rishi @rxerium.com · Sep 20
🚨 Critical — CVE-2025-10035 (CVSS 10.0): Fortra has disclosed a deserialization flaw in the GoAnywhere MFT License Servlet that can allow remote command-injection.

I've created a #nuclei script to detect vulnerable instances at scale:
github.com/rxerium/CVE-...
Rishi @rxerium.com · Sep 11
Detection for critical SAP Netweaver vulnerability (CVE-2025-42944):
github.com/rxerium/CVE-...
Reposted by Rishi
🕵️‍♂️ New OSINT training drop: Learn how to use X (Twitter) Advanced Search to trace usernames, map networks & uncover hidden accounts.

Presented by @rxerium.com for the UK OSINT Community.

🎥 Watch here: www.youtube.com/watch?v=Yj2m...
Using OSINT to Investigate on Twitter/X
YouTube video by UK OSINT Community
www.youtube.com
Rishi @rxerium.com · Sep 4
🚨 New zero day added to the CISA KEV under an hour ago and is actively being exploited in the wild - CVE-2025-53690; CVSS 9.0 (Critical)

Check to see if you're vulnerable:
github.com/rxerium/CVE-...

Patches / workarounds are available:
support.sitecore.com/kb?id=kb_art...
Rishi @rxerium.com · Aug 17
I've created a vulnerability script for CVE-2025-8875 and CVE-2025-8876 - both currently being actively exploited in the wild as reported by @cisacyber.

Detection script:
github.com/rxerium/CVE-...

Patches are available:
status.n-able.com/2025/08/13/a...
Rishi @rxerium.com · Aug 1
Catch me at #BSidesVegas or #DEFCON - I’ll be handing out exclusive UK OSINT swag. Come say hi and snag some before its all gone! 👋
Rishi @rxerium.com · Jul 25
Detection script for Micollab SQL injection vulnerability, tagged CVE-2025-52914 (high severity):
github.com/rxerium/CVE-...

www.mitel.com/support/secu...
Rishi @rxerium.com · Jul 21
🗣️ DNS-Based OSINT Tactics for Product and Service Discovery
📍 Red Team Village
⏰ Saturday 9th August from 11am - 4:50pm

Hope you see you there :wave:

#hackersummercamp #nuclei #amass #defcon33 #redteamvillage
Rishi @rxerium.com · Jul 21
I’m thrilled to be speaking at DEFCON in Las Vegas this year!

I’ll be sharing insights from my recent contributions to the OWASP Amass project and Project Discovery’s Nuclei, focusing on DNS-based techniques for Product and Service Discovery. More details below:
Rishi @rxerium.com · Jul 19
🚨 new zero day affecting crushFTP instances (CVE-2025-54309) being exploited in the wild:
~291,903 exposed devices running crushFTP (as of 19.07.25) according to @shodanhq:
`http.html:"crushftp"`

Patch now:
www.crushftp.com/crush11wiki/...
Rishi @rxerium.com · Jul 16
I've created a passive detection script to detect instances that are vulnerable to critical RCE tagged as CVE-2025-47812:
github.com/rxerium/CVE-...

Around ~4000 instances exposed to the internet as of 25.07.16
`http.favicon.hash:963565804`
Rishi @rxerium.com · Jun 23
Want to detect the internal security posture of an organisation without contacting them or installing agents on their local network?

I created a detection script in my spare time which takes advantage of exposed Safebase portals
github.com/rxerium/inte...

#osint #nuclei
GitHub - rxerium/internal-security-detect: The detection of internal security controls at a company
The detection of internal security controls at a company - rxerium/internal-security-detect
github.com
Rishi @rxerium.com · Jun 10
I've created a passive detection script for this Wazuh vulnerability. It is currently being exploited in the wild (as reported by CISA). The script can be found here:
github.com/rxerium/CVE-...

Original article:
thehackernews.com/2025/06/botn...
GitHub - rxerium/CVE-2025-24016: Deserialization of Untrusted Data Vulnerability in the Wazuh software
Deserialization of Untrusted Data Vulnerability in the Wazuh software - rxerium/CVE-2025-24016
t.co
Rishi @rxerium.com · Jun 9
Hey Bluesky! I’m less active here but more engaged on Twitter and GitHub. My socials can be found on my website: rxerium.com 🤝
Rishi
rxerium.com
Rishi @rxerium.com · Jun 3
I've created a script to detect CVE-2025-49113 based on versions exposed in the html body:
github.com/rxerium/CVE-...

Use at your own risk.
Reposted by Rishi
🔍 Swipe a stranger’s selfie—are you already over the ethical line?

In the latest article from the UK OSINT Community, Rishi Chudasama shows why “public” doesn’t mean “permissible,” urging OSINT pros to match technical skill with empathy and respect for privacy.

📖 Read: www.osint.uk/content/ethi...
Ethical Implications of OSINT in Personal Data Collection
Exploring the ethical limits of collecting personal data during investigations.
www.osint.uk
Rishi @rxerium.com · Apr 26
2,968 instances exposed to the internet according to
t.co/y1LwY9Ybss
x.com