Would you read your fuzzing wordlist before using it?
What if there is a destructive query or an attacker payload inside?
github.com/danielmiessl...
@maltemo.bsky.social
๐ซ๐ท - Security auditor. In my free time, interested in development, OSINT & Forensic. Eclectic hobbies and interests. Blog : https://maltemo.github.io
Would you read your fuzzing wordlist before using it?
What if there is a destructive query or an attacker payload inside?
github.com/danielmiessl...
Now live on tools.honoki.net/smuggler.html
Let me know what you think! โจ
I'm happy to release a script gadgets wiki inspired by the work of @slekies, @kkotowicz, and @sirdarckcat in their Black Hat USA 2017 talk! ๐ฅ
The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs ๐
gmsgadget.com
1/4
Today was my last day as a pentester at Bsecure. After a three-year journey of hunting on the side, Iโm ready to go all-in as a full-time bug bounty hunter. You can read about my journey from pentester to full-time hunter here: gelu.chat/posts/from-p...
04.07.2025 15:09 โ ๐ 23 ๐ 7 ๐ฌ 3 ๐ 0Documentรฉ, Sourcรฉ, Miniaturรฉ, Plus qu'ร ... Siroter ! ๐
Cc @maltemo.bsky.social ๐ค @KharaTheOne (X)
www.youtube.com/live/we_T4x6...
Intรฉressant, attribution officielle par l'รฉtat Franรงais de l'attaque TV5 Monde ร l'APT28 appartenant au GRU.
bsky.app/profile/gabr...
Firefox treats multipart/x-mixed-replace like HTML. Chrome doesnโt.
That tiny difference? It can turn a "non-exploitable" XSS into a real one.
Abuse boundary handling, bypass filters, and make your payload land.
thespanner.co.uk/making-the-u...
Blip @maltemo.bsky.social Bloup @KharaTheOne (X) Boum ๐ฃ๏ธ
www.twitch.tv/thelaluka
Do you use WebSockets? Read our latest blog post to find out how modern browsers may (or may not) be protecting you from Cross-Site WebSocket Hijacking.
blog.includesecurity.com/2025/04/cros...
I was reading Chromium source code from a website that doesnโt have search bar or any indexing and searched my way with google dorks: chromium.googlesource.com/chromium/src...
I just discovered there is an index version featuring function hovering and linking ๐คฆโโ๏ธ:
source.chromium.org/chromium/chr...
๐ฅ My Black Hat talk is now live! ๐ฅ
Watch how email parsing quirks turned into RCE in Joomla and critical access control bypasses across major platforms. See how these subtle flaws led to serious exploits!
www.youtube.com/watch?v=Uky4...
You might have noticed that the recent SAML writeups omit some crucial details. In "SAML roulette: the hacker always wins", we share everything you need to know for a complete unauthenticated exploit on ruby-saml, using GitLab as a case-study.
portswigger.net/research/sam...
Great resource on secret leakage, I invite you to read it.
12.03.2025 11:42 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0I published my Documentation of CAN Arsenal for @kalilinux NetHunter
๐๐๐
v0lk3n.github.io/NetHunter/CA...
It should be released as experimental version in 2025.1!
I will keep updating it and add functionality to it!
@yesimxev @kimocoder
#NetHunter #KaliLinux #CarHacking #CANBus
A few weeks ago, I've learned about the Okta Bcrypt incident from the @gergely.pragmaticengineer.com newsletter, and it made me wonder about the API choices by crypto libraries that allowed this incident to be unnoticed for years. My new post explores the topic. Enjoy! =)
n0rdy.foo/posts/202501...
I got my answer, itโs the CSP that blocks an attacker from adding another Trusted Type. You canโt add a new trusted type if itโs name is not stated in the CSP. You canโt replace an existing one unless the 'allow-duplicates' is stated in the CSP.
Source: developer.mozilla.org/en-US/docs/W...
Health insurance OK???
COOL! Part 2/3 then!
www.youtube.com/watch?v=CKqr...
Hi it's me again, I've been calling for a while now, you need to pay your health insurance Sir...
Or have some replays? ๐
La derniรจre Techno Watch avec @Drypaints @Maltemo et @pentest_swissky !๐ฟ
www.youtube.com/watch?v=ysen...
1/2
Yop ! ๐ฟ
Reprise des veilles technos ce soir 21h ! ๐
En compagnie de @drypaint.bsky.social @maltemo.bsky.social @swissky.bsky.social ๐
~ See you there ~
www.twitch.tv/thelaluka
Question about Trusted Types :
What blocks an attacker from creating itโs own Trusted TypePolicy from the TrustedTypePolicyFactory with a function that doesnโt sanitize input data ? Am I missing something ?
Hot out of the oven! The Cookie Sandwich โ a technique that lets you bypass the HttpOnly protection! This isn't your average dessert; itโs a recipe for disaster if your app isnโt prepared: portswigger.net/research/ste...
22.01.2025 15:06 โ ๐ 34 ๐ 13 ๐ฌ 0 ๐ 4@fox0x01.bsky.social just reported an account trying to impersonate you : [@]foxox01.bsky.social
08.01.2025 15:09 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0Somebody uploaded to SlideShare the slides of my talk at @northsec.bsky.social 2023 ๐
Itโs the sequel of the first @burpsuite.bsky.social talk I ever gave, exactly 10 years before ๐ ๏ธ
Enjoy these 50 slides of Burp tips ๐๐
hear me out, pass the certificate auth on nxc ๐ฅ
31.12.2024 17:11 โ ๐ 7 ๐ 3 ๐ฌ 0 ๐ 0Want to run roadrecon, but a device compliance policy is getting in your way? You can use the Intune Company Portal client ID, which is a hardcoded and undocumented exclusion in CA for device compliance. It has user_impersonation rights on the AAD Graph ๐
12.12.2024 16:00 โ ๐ 45 ๐ 20 ๐ฌ 3 ๐ 1Just discovered this nice resource about DOMย Clobbering attacks :
domclob.xyz
Thank you Soheil for this amazing work