Maltemo's Avatar

Maltemo

@maltemo.bsky.social

๐Ÿ‡ซ๐Ÿ‡ท - Security auditor. In my free time, interested in development, OSINT & Forensic. Eclectic hobbies and interests. Blog : https://maltemo.github.io

33 Followers  |  61 Following  |  7 Posts  |  Joined: 25.11.2024  |  1.9542

Latest posts by maltemo.bsky.social on Bluesky


Preview
[Bug report]: Potential dangerous line in file `wso2-enterprise-integrator.txt` ยท Issue #1267 ยท danielmiessler/SecLists I discovered while using the wordlist wso2-enterprise-integrator.txt that one of its entry tries to exploit what seems to be a SSRF to a (external or local ?) server : carbon/wsdl2code/index.jsp?ge...

Would you read your fuzzing wordlist before using it?

What if there is a destructive query or an attacker payload inside?

github.com/danielmiessl...

04.12.2025 16:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Now live on tools.honoki.net/smuggler.html

Let me know what you think! โœจ

22.07.2025 13:38 โ€” ๐Ÿ‘ 27    ๐Ÿ” 11    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 2
Post image

I'm happy to release a script gadgets wiki inspired by the work of @slekies, @kkotowicz, and @sirdarckcat in their Black Hat USA 2017 talk! ๐Ÿ”ฅ

The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs ๐Ÿ‘‡

gmsgadget.com

1/4

24.07.2025 15:31 โ€” ๐Ÿ‘ 23    ๐Ÿ” 13    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Finding Freedom, One Bug at a Time: My Journey from Pentester to Full-Time Hunter After seven years in pentesting, I transitioned full-time into bug bounty hunting, leveraging deep experience and continuous learning. This article shares key moments and insights from that journey.

Today was my last day as a pentester at Bsecure. After a three-year journey of hunting on the side, Iโ€™m ready to go all-in as a full-time bug bounty hunter. You can read about my journey from pentester to full-time hunter here: gelu.chat/posts/from-p...

04.07.2025 15:09 โ€” ๐Ÿ‘ 23    ๐Ÿ” 7    ๐Ÿ’ฌ 3    ๐Ÿ“Œ 0
Post image

Documentรฉ, Sourcรฉ, Miniaturรฉ, Plus qu'ร ... Siroter ! ๐ŸŽ
Cc @maltemo.bsky.social ๐Ÿค @KharaTheOne (X)

www.youtube.com/live/we_T4x6...

02.05.2025 17:49 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Intรฉressant, attribution officielle par l'รฉtat Franรงais de l'attaque TV5 Monde ร  l'APT28 appartenant au GRU.

bsky.app/profile/gabr...

29.04.2025 15:44 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Making the Unexploitable Exploitable with X-Mixed-Replace on Firefox - The Spanner In this post, weโ€™ll look at an interesting difference in how Firefox and Chrome handle the multipart/x-mixed-replace content type. While Chrome treats it as an image, Firefox renders it as HTML - some...

Firefox treats multipart/x-mixed-replace like HTML. Chrome doesnโ€™t.
That tiny difference? It can turn a "non-exploitable" XSS into a real one.
Abuse boundary handling, bypass filters, and make your payload land.

thespanner.co.uk/making-the-u...

25.04.2025 21:50 โ€” ๐Ÿ‘ 19    ๐Ÿ” 9    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Blip @maltemo.bsky.social Bloup @KharaTheOne (X) Boum ๐Ÿ’ฃ๏ธ
www.twitch.tv/thelaluka

28.04.2025 10:59 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Cross-Site WebSocket Hijacking Exploitation in 2025 - Include Security Research Blog Include Security's latest blog post covers Cross-Site WebSocket Hijacking and how modern browser security features do (or don't) protect users. We discuss Total Cookie Protection in Firefox, Private N...

Do you use WebSockets? Read our latest blog post to find out how modern browsers may (or may not) be protecting you from Cross-Site WebSocket Hijacking.

blog.includesecurity.com/2025/04/cros...

17.04.2025 19:59 โ€” ๐Ÿ‘ 1    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
/ - chromium/src - Git at Google

I was reading Chromium source code from a website that doesnโ€™t have search bar or any indexing and searched my way with google dorks: chromium.googlesource.com/chromium/src...

I just discovered there is an index version featuring function hovering and linking ๐Ÿคฆโ€โ™‚๏ธ:
source.chromium.org/chromium/chr...

28.03.2025 08:53 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls
YouTube video by Black Hat Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls

๐Ÿ”ฅ My Black Hat talk is now live! ๐ŸŽฅ

Watch how email parsing quirks turned into RCE in Joomla and critical access control bypasses across major platforms. See how these subtle flaws led to serious exploits!

www.youtube.com/watch?v=Uky4...

20.03.2025 12:41 โ€” ๐Ÿ‘ 23    ๐Ÿ” 6    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
SAML roulette: the hacker always wins Introduction In this post, weโ€™ll show precisely how to chain round-trip attacks and namespace confusion to achieve unauthenticated admin access on GitLab Enterprise by exploiting the ruby-saml library

You might have noticed that the recent SAML writeups omit some crucial details. In "SAML roulette: the hacker always wins", we share everything you need to know for a complete unauthenticated exploit on ruby-saml, using GitLab as a case-study.

portswigger.net/research/sam...

18.03.2025 14:57 โ€” ๐Ÿ‘ 53    ๐Ÿ” 23    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 4
Preview
The State of Secrets Sprawl Report | GitGuardian

Great resource on secret leakage, I invite you to read it.

12.03.2025 11:42 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

I published my Documentation of CAN Arsenal for @kalilinux NetHunter

๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡

v0lk3n.github.io/NetHunter/CA...

It should be released as experimental version in 2025.1!

I will keep updating it and add functionality to it!

@yesimxev @kimocoder
#NetHunter #KaliLinux #CarHacking #CANBus

12.02.2025 00:37 โ€” ๐Ÿ‘ 1    ๐Ÿ” 2    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Preview
n0rdy - What Okta Bcrypt incident can teach us about designing better APIs

A few weeks ago, I've learned about the Okta Bcrypt incident from the @gergely.pragmaticengineer.com newsletter, and it made me wonder about the API choices by crypto libraries that allowed this incident to be unnoticed for years. My new post explores the topic. Enjoy! =)
n0rdy.foo/posts/202501...

22.01.2025 17:50 โ€” ๐Ÿ‘ 3    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
CSP: trusted-types - HTTP | MDN The HTTP Content-Security-Policy (CSP) trusted-types Experimental directive instructs user agents to restrict the creation of Trusted Types policies - functions that build non-spoofable, typed value...

I got my answer, itโ€™s the CSP that blocks an attacker from adding another Trusted Type. You canโ€™t add a new trusted type if itโ€™s name is not stated in the CSP. You canโ€™t replace an existing one unless the 'allow-duplicates' is stated in the CSP.

Source: developer.mozilla.org/en-US/docs/W...

06.02.2025 10:26 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Health insurance OK???
COOL! Part 2/3 then!

www.youtube.com/watch?v=CKqr...

04.02.2025 15:24 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
EP 177 | Techno Watch January Ft. @Drypaints @Maltemo @pentest_swissky
YouTube video by Laluka EP 177 | Techno Watch January Ft. @Drypaints @Maltemo @pentest_swissky

Hi it's me again, I've been calling for a while now, you need to pay your health insurance Sir...
Or have some replays? ๐Ÿ˜

La derniรจre Techno Watch avec @Drypaints @Maltemo et @pentest_swissky !๐ŸŒฟ

www.youtube.com/watch?v=ysen...

1/2

03.02.2025 15:30 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1
Preview
Twitch Twitch is the world

Yop ! ๐ŸŒฟ
Reprise des veilles technos ce soir 21h ! ๐ŸŒ–
En compagnie de @drypaint.bsky.social @maltemo.bsky.social @swissky.bsky.social ๐Ÿ˜Ž

~ See you there ~
www.twitch.tv/thelaluka

28.01.2025 17:47 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1

Question about Trusted Types :
What blocks an attacker from creating itโ€™s own Trusted TypePolicy from the TrustedTypePolicyFactory with a function that doesnโ€™t sanitize input data ? Am I missing something ?

28.01.2025 10:13 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Stealing HttpOnly cookies with the cookie sandwich technique In this post, I will introduce the "cookie sandwich" technique which lets you bypass the HttpOnly flag on certain servers. This research follows on from Bypassing WAFs with the phantom $Version cookie

Hot out of the oven! The Cookie Sandwich โ€“ a technique that lets you bypass the HttpOnly protection! This isn't your average dessert; itโ€™s a recipe for disaster if your app isnโ€™t prepared: portswigger.net/research/ste...

22.01.2025 15:06 โ€” ๐Ÿ‘ 34    ๐Ÿ” 13    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 4

@fox0x01.bsky.social just reported an account trying to impersonate you : [@]foxox01.bsky.social

08.01.2025 15:09 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Burp suite pro tips and tricks for hacking Burp suite pro tips and tricks for hacking - Download as a PDF or view online for free

Somebody uploaded to SlideShare the slides of my talk at @northsec.bsky.social 2023 ๐ŸŒ

Itโ€™s the sequel of the first @burpsuite.bsky.social talk I ever gave, exactly 10 years before ๐Ÿ› ๏ธ

Enjoy these 50 slides of Burp tips ๐ŸŽ๐ŸŽ…

23.12.2024 22:00 โ€” ๐Ÿ‘ 38    ๐Ÿ” 18    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

hear me out, pass the certificate auth on nxc ๐Ÿ”ฅ

31.12.2024 17:11 โ€” ๐Ÿ‘ 7    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Want to run roadrecon, but a device compliance policy is getting in your way? You can use the Intune Company Portal client ID, which is a hardcoded and undocumented exclusion in CA for device compliance. It has user_impersonation rights on the AAD Graph ๐Ÿ˜ƒ

12.12.2024 16:00 โ€” ๐Ÿ‘ 45    ๐Ÿ” 20    ๐Ÿ’ฌ 3    ๐Ÿ“Œ 1
DOM Clobbering DOM Clobbering Wiki

Just discovered this nice resource about DOMย Clobbering attacks :
domclob.xyz

Thank you Soheil for this amazing work

26.11.2024 22:56 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@maltemo is following 20 prominent accounts