I'm happy to release a script gadgets wiki inspired by the work of @slekies, @kkotowicz, and @sirdarckcat in their Black Hat USA 2017 talk! 🔥
The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs 👇
gmsgadget.com
1/4
My french team, for the world cup, and in collaboration with my wife, printed me a hoodie with a redacted payload on it. That bug was super fun, but quite hard to exploit!
If encoded words, RFC2047 and so on are strange words to you, @garethheyes presented at the same time their…
My french team, for the world cup, and in collaboration with my wife, printed me a hoodie with a redacted payload on it. That bug was super fun, but quite hard to exploit!
If encoded words, RFC2047 and so on are strange words to you, @garethheyes presented at the same time their… https://t.co/8o2j0Bu3Jm
Some time ago I found 2 vulns in Collabora Online that when chained allowed to arbitrary file write. When digging further with my colleague @Icare1337 we found out a pre auth RCE in a largely used open source software. We'll do a write up later. CVE below:
github.com/CollaboraOnlin…
Half of our 2025 Bucket List has already been achieved 🤯
Kudos to @truffzor, @Icare1337 & @LdrTom for the epic collab, and to @XelBounty for the massive impact!
Bug hunters, keep crushing it - swag packs are up for grabs! 🎁
#YesWeRHackers
I recently found a blind FreeMarker SSTI on a bbp. It was not possible to RCE but I found some nice gadgets to enumerate accessible variables, read data blindly or perform some DoS. I documented that here if someone is interested
gist.github.com/n1nj4sec/5e3ff…
🎬 #TalkiePwnii is LIVE!
Introducing our new series starring @pwnwithlove! In each video, Pwnii will break down Dojo challenges, sharing various solutions & technical tips 😎
Catch the first episode about our ‘Shell Escape’ challenge 👇
#YesWeRHackersyoutube.com/watch?v=Rw3wWi…
The time has come, and with it your reading material for the week.
Phrack #71 is officially released ONLINE! Let us know what you think!
phrack.org/issues/71/1.ht…
My team (France) finishes first at the @Hacker0x01#AmbassadorWorldCup qualification round. What a pleasure to be part of such an engaged and skilled team !
My team (France) finishes first at the @Hacker0x01#AmbassadorWorldCup qualification round. What a pleasure to be part of such an engaged and skilled team !
I'm very excited to finally share the first part of the research I did into Ghostscript. This post details the exploitation of CVE-2024-29510, a classic format string bug, which we abuse to bypass the SAFER sandbox and gain RCE.
codeanlabs.com/blog/research/…
New update on Hackyx! You can now share with us any technical content, blog post, or writeup that you found interesting.
It will then be moderated before being added to Hackyx.
hackyx.io
DOMLogger++ v1.0.4 is now out and available in stores! It comes with new features that allow you, for example, to easily dig into DOM gadget occurrences after an innerHTML sink 🔥
More details can be found here 👇
github.com/kevin-mizu/dom…
1/3
Really proud of those bypass/mXSS variations. They involve some cool second-order DOM Clobbering and a new mutation gadget that I would like to call the elevator x)
1/2
Sometime ago I found another vulnerability on Adobe Commerce while hunting with the French team during @Hacker0x01 world cup. What a pleasure to hunt with one of the best hackers I know => @Blaklis_ 🔥
Sometime ago I found another vulnerability on Adobe Commerce while hunting with the French team during @Hacker0x01 world cup. What a pleasure to hunt with one of the best hackers I know => @Blaklis_ 🔥
82 Followers 2K Following🐞 Bug Bounty Hunter | 🧠 Think like a dev, hack like a ghost
Focus: Business Logic | RCE | LFI | SSRF
On a $10K mission | #YesWeHack #bugcrowd
570 Followers 613 FollowingHacker 💻 speaker 📣 Jack of All Trades 🃏
Social Engineering, OSINT, AD, TTRPG
Pentester / Red Team Operator
@ Bsecure / Parabellum Services
684 Followers 0 FollowingMapping the internet - turning DNS/host data into intel for sec teams, OSINT & bug-bounty hunters. Automated recon & real-time alerts.
129K Followers 60 FollowingProviding Cyber Threat Intelligence from the Dark Web & Clearnet: Breaches, Ransomware, Darknet Markets, Threat Alerts & more. https://t.co/Fi7VW9lg94
570 Followers 613 FollowingHacker 💻 speaker 📣 Jack of All Trades 🃏
Social Engineering, OSINT, AD, TTRPG
Pentester / Red Team Operator
@ Bsecure / Parabellum Services
637K Followers 35 FollowingWe're an AI safety and research company that builds reliable, interpretable, and steerable AI systems. Talk to our AI assistant @claudeai on https://t.co/FhDI3KQh0n.
3K Followers 205 FollowingSecurity Engineer at big tech | Part Time Security Researcher | Build Pipeline Menace | All thoughts and opinions are my own.
629 Followers 1 FollowingBuilding AI that finds & fixes web security bugs — autonomously. SOTA in white-box bug hunting. Try Takumi: https://t.co/zruO7dgEcc
357 Followers 7 FollowingResearch-powered Web3 security team founded by top-ranked competitive hackers. Audits for crypto wallets, TON L1 and smart contracts.
10K Followers 6 FollowingBringing AI to offensive security by autonomously finding and exploiting web vulnerabilities. Watch XBOW hack things: https://t.co/D5Mco1u8zM