MaxMnMl's Avatar

MaxMnMl

@maxmnml.bsky.social

[ - ] https://github.com/MaxMnMl [ - ] c12f97f864dff657f7294c6c9d03e18d

39 Followers  |  88 Following  |  53 Posts  |  Joined: 10.10.2023  |  1.945

Latest posts by maxmnml.bsky.social on Bluesky

Preview
Explaining XSS without parentheses and semi-colons Recently, I received an email from a reader asking if I could write an article explaining XSS without parentheses and semi-colons, saying that the payloads in it were hard to understand. Therefore, th

blog.huli.tw/2025/09/15/e...

11.10.2025 07:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Make Self-XSS Great Again Disclaimer: This article is intended for security professionals conducting authorized testing within the scope of a contract. The author is not responsible for any damage caused by the application of ...

How to make Self-XSS great again πŸ”₯🧯

blog.slonser.info/posts/make-s...

29.06.2025 07:11 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
One-Click RCE in ASUS's Preinstalled Driver Software One-Click RCE in ASUS’s Preinstalled Driver Software Part Two of this series on ASUS will be dropping within a week, yes it somehow manages to get worse Introduction This story begins with a conversat...

One-Click RCE in ASUS’s Preinstalled Driver Software 🧯πŸ”₯
mrbruh.com/asusdriverhub/

30.05.2025 13:16 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Google Cloud Account Takeover via URL Parsing Confusion TL;DR

Google Cloud Account Takeover via URL Parsing Confusion πŸ’£πŸ”₯πŸ‘€

infosecwriteups.com/google-cloud...

03.05.2025 17:25 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Dojo #40 - Hacker profile - YesWeHack Dojo # Hacker profile - Dojo #40 Active until : **17th April - 2025** Authors: [Minilucker](https://x.com/0xidel) #### How to submit your report 1. Visit the Dojo program at [https://yeswehack.com/progr...

πŸ”“ Just beat the "Dojo #40 - Hacker profile" challenge on @YesWeHack!
Think you can match my skills? 🌟

dojo-yeswehack.com/challenge/pl...

#YesWeHack #ChallengeAccepted

30.03.2025 20:55 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Paged Out! #6 has arrived! And it's jam-packed with content!
You can download it here:
pagedout.institute?page=issues....

29.03.2025 12:23 β€” πŸ‘ 23    πŸ” 27    πŸ’¬ 0    πŸ“Œ 3

Amazing dude πŸ”₯πŸ’ͺ

01.03.2025 09:30 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Exploring the DOMPurify library: Hunting for Misconfigurations (2/2). Tags:Article - Article - Web - mXSS Exploring the DOMPurify library: Hunting for Misconfigurations (2/2)

Exploring Dompurify Misc (2/2) by @mizu.re … What an Amazing Work 🫢

mizu.re/post/explori...

01.03.2025 08:01 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Dojo #39 - Phishing - YesWeHack Dojo # Phishing Active until : **28th February - 2025** #### How to submit your report 1. Visit the Dojo program at [https://yeswehack.com/programs/dojo](https://yeswehack.com/programs/dojo) 2. Click on *...

I just pwned the "Dojo #39 - Phishing" challenge on @yeswehack.bsky.social
Who’s next to join the fun? πŸš€
dojo-yeswehack.com/challenge/pl...
#YesWeHack #ChallengeAccepted

04.02.2025 14:43 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
About This Series | Beyond XSS As a software engineer, you must be familiar with information security. In your work projects, you may have gone through security audits, including static code scanning, vulnerability scanning, or pen...

One of the Best Blog serie about XSS

aszx87410.github.io/beyond-xss/en/

01.02.2025 09:26 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
World's First MIDI Shellcode Blog post about a reverse engineering project

Amazing Work πŸ‘ … The MIDI Shellcode πŸŽΉπŸ‘Ύ
psi3.ru/blog/swl01u/

27.01.2025 21:36 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Testing JavaScript files for bug bounty hunters You've with no doubt heard or seen other fellow bug bounty hunters find critical vulnerabilities thanks to JavaScript file enumeration, right? This article is all about the importance of testing and e...

Testing JavaScript file for BB πŸ•ΈοΈπŸž

click.mlsend2.com/link/c/YT0yN...

12.01.2025 08:10 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Hunting for blind XSS vulnerabilities: A complete guide Cross-site scripting (XSS) vulnerabilities are quite common and fun to find. They also carry great impact when chained with other vulnerabilities. But there's another variant of this vulnerability typ...

Hunting for blind XSS πŸ•ΈοΈ 🐞

www.intigriti.com/researchers/...

06.01.2025 06:11 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Broken authentication: 7 Advanced ways of bypassing insecure 2-FA implementations Two-factor authentication (2FA) has become the go-to solution for strengthening account security. More and more companies are deploying 2FA implementations, and some even enforce them on their users t...

Broken authentication: 7 Advanced ways of bypassing insecure 2-FA implementations πŸͺ²

blog.intigriti.com/hacking-tool...

09.12.2024 06:19 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
OAuth Non-Happy Path to ATO Learn how small errors in OAuth implementation can lead to significant security vulnerabilities like one-click account takeover in web applications

OAuth Non-Happy Path to ATO 🎯

blog.voorivex.team/oauth-non-ha...

06.12.2024 06:30 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Dojo #37 - Hacker forum - YesWeHack Dojo # Hacker forum Active until : **12th December - 2024** #### How to submit your report 1. Visit the Dojo program at [https://yeswehack.com/programs/dojo](https://yeswehack.com/programs/dojo) 2. Click ...

Just completed the "Dojo #37 - Hacker forum" challenge on @yeswehack.bsky.social
Level up with me! 🌟
dojo-yeswehack.com/challenge/pl...
#YesWeHack #ChallengeAccepted

05.12.2024 13:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Bypassing WAFs with the phantom $Version cookie HTTP cookies often control critical website features, but their long and convoluted history exposes them to parser discrepancy vulnerabilities. In this post, I'll explore some dangerous, lesser-known

Bypassing WAFs with the phantom $Version cookie πŸͺ

portswigger.net/research/byp...

04.12.2024 21:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Cross-Site POST Requests Without a Content-Type Header / nastystereo.com

Cross-Site POST Requests Without a Content-Type Header πŸ›°οΈ

nastystereo.com/security/cro...

04.12.2024 20:26 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Zero-Day in Active Directory Certificate Services: Researcher Exposes CVE-2024-49019 with PoC Discover the details of the critical zero-day vulnerability CVE-2024-49019 affecting Active Directory Certificate Services (AD CS).

Zero-Day in Active Directory Certificate Services: Researcher Exposes CVE-2024-49019 with PoC πŸš€πŸͺŸ

securityonline.info/zero-day-in-...

30.11.2024 08:38 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Bypass Apache Superset restrictions to perform SQL injections The following article explains how during an audit we took a look at Apache Superset and found bypasses (by reading the PostgreSQL documentation) for the security measures implemented.

Bypass Apache Superset to perform SQLI πŸ’‰πŸ¦„

blog.quarkslab.com/bypass-apach...

30.11.2024 08:35 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
A mindmap with the following text https://tl.gd/n_1ss2vji

A mindmap with the following text https://tl.gd/n_1ss2vji

What is an API? What makes them special? And what kind of APIs are out there? #apisecurity #apis #bugbountytips #BugBounty

30.11.2024 08:00 β€” πŸ‘ 34    πŸ” 5    πŸ’¬ 1    πŸ“Œ 0

β€ͺPoc: github.com/lflare/cve-2...

03.07.2024 05:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

πŸ’’ regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems
(CVE-2024-6387)

Qualys Paper : www.qualys.com/2024/07/01/c...

03.07.2024 05:03 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
β€ŽClick HereΒ : 139. Mic Drop: GhostSec’s quest for redemption: their leader claims their life of crime is over. sur AppleΒ Podcasts β€ŽAfficher Click Here, Γ©p 139. Mic Drop: GhostSec’s quest for redemption: their leader claims their life of crime is over. - 14 juin 2024

The leader of GhostSec, Sebastian Dante Alexander, talks about the group's decision to abandon financial hacking and shift its focus to hacktivism.

podcasts.apple.com/fr/podcast/c...

15.06.2024 13:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Hacking Millions of Modems (and Investigating Who Hacked My Modem) Two years ago, something very strange happened to me while working from my home network. I was exploiting a blind XXE vulnerability that required an external HTTP server to smuggle out files, so I spu...

Hacking Millions Of Modem πŸ‘€. An incredible work of samwcyo, a must read guys. πŸ’’

samcurry.net/hacking-mill...

08.06.2024 13:53 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

πŸ’’Le groupe de hacker pro russe Killnet annonce detenir la version originale de Pegasus (NSO Group). Mise en vente : 1Β 500Β 000Β $.

« Nous avons actuellement entre nos mains la version originale. Nous avons le programme pour toujours ! NSO ne pourra pas restreindre l’accΓ¨s.Β Β»

06.04.2024 10:26 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

The DGSI gets DDOSed by the GLORIAMIST hacker group πŸ˜… We've seen it all !!

01.04.2024 21:10 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Beware! Backdoor found in XZ utilities used by many Linux distros (CVE-2024-3094) - Help Net Security A vulnerability (CVE-2024-3094) in XZ Utils may enable a malicious actor to gain unauthorized access to Linux systems remotely.

Outch πŸ’’ xz β€”version

www.helpnetsecurity.com/2024/03/29/c...

29.03.2024 20:42 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers PyPI temporarily shut down new user sign-ups and project creation to combat a malicious malware upload campaign.

The python and the mongoose 🐍

thehackernews.com/2024/03/pypi...

29.03.2024 06:17 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Windows Task Manager Runs Doom (896 cores)
Playing Doom in Windows task manager. Finally got it working and looking decent!But can it run Crysis?...Β ctrl+alt+doomDone by taking the original pixels, th... Windows Task Manager Runs Doom (896 cores)

OMG 😧 Playing doom using windows task manager youtu.be/hSoCmAoIMOU?... 32 sockets, 896 cores, 1792 logical processors??? 🀯 very cool indeed πŸ‘Œ

27.03.2024 21:04 β€” πŸ‘ 13    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

@maxmnml is following 20 prominent accounts