0x999 🇮🇱 (@_0x999) 's Twitter Profile
0x999 🇮🇱

@_0x999

"ɪ ᴛᴏᴏᴋ ᴛʜᴇ ʜᴇʟʟ ɪ ᴡᴀꜱ ɢᴏɪɴɢ ᴛʜʀᴏᴜɢʜ (666) ᴀɴᴅ ꜰʟɪᴘᴘᴇᴅ ɪᴛ ᴏᴠᴇʀ ɪɴᴛᴏ ꜱᴏᴍᴇᴛʜɪɴɢ ᴘᴏꜱɪᴛɪᴠᴇ (999)"💔

ID: 1584102758872924162

linkhttps://0x999.net calendar_today23-10-2022 08:41:58

227 Tweet

952 Followers

246 Following

0x999 🇮🇱 (@_0x999) 's Twitter Profile Photo

Just finished reading #javascriptforhackers by Gareth Heyes \u2028 , learned lots of new tricks, if you’re interested in javascript I highly recommend buying a copy

Just finished reading #javascriptforhackers by <a href="/garethheyes/">Gareth Heyes \u2028</a> , learned lots of new tricks, if you’re interested in javascript I highly recommend buying a copy
0x999 🇮🇱 (@_0x999) 's Twitter Profile Photo

Very cool technique by Luke Jahnke for POST based CSRF without a content-type header using a Blob object, Interestingly it also seems to work using a Uint8Array

Very cool technique by <a href="/lukejahnke/">Luke Jahnke</a> for POST based CSRF without a content-type header using a Blob object, Interestingly it also seems to work using a Uint8Array
0x999 🇮🇱 (@_0x999) 's Twitter Profile Photo

My blog post, "Exploring Javascript Events & Bypassing WAFs via Character Normalization" has been nominated for the Top 10 Web Hacking Techniques of 2024!☺️ If you found it useful, I’d greatly appreciate your vote at the link below 👇 portswigger.net/polls/top-10-w…

Jorian (@j0r1an) 's Twitter Profile Photo

This month, 0x999 🇮🇱 made an awesome and difficult Intigriti XSS challenge. I really enjoyed the openness of this challenge resulting in an unintended solution and the first solve 🩸! Check out how I got there in my writeup below: jorianwoltjer.com/blog/p/hacking…

0x999 🇮🇱 (@_0x999) 's Twitter Profile Photo

Here is my author's writeup for Intigriti's March 0325 CTF challenge, Thanks to everyone who participated & great job by all the solvers! 🔥 0x999.net/blog/intigriti…

Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

Crafty JavaScript-context XSS vector using ondevicemotion, setTimeout, and URIError spoofing to trigger alert(1) now added to the XSS cheat sheet. By 0x999 🇮🇱 inspired by terjanq. Link to vector👇

Crafty JavaScript-context XSS vector using ondevicemotion, setTimeout, and URIError spoofing to trigger alert(1) now added to the XSS cheat sheet. By <a href="/_0x999/">0x999 🇮🇱</a> inspired by <a href="/terjanq/">terjanq</a>.

Link to vector👇
Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

This vector adds an onerror handler with eval, rewrites all ReferenceError names, then triggers an error to execute the payload. Just added it to the XSS cheat sheet. Credit to 0x999 🇮🇱, inspired by terjanq. Link to vector👇

This vector adds an onerror handler with eval, rewrites all ReferenceError names, then triggers an error to execute the payload. Just added it to the XSS cheat sheet. Credit to <a href="/_0x999/">0x999 🇮🇱</a>, inspired by <a href="/terjanq/">terjanq</a>.

Link to vector👇
Meydi (@neotrony) 's Twitter Profile Photo

0x999.net/blog/exploring… This research from 0x999 🇮🇱 is truly a goldmine. I solved a challenge by combining the name and message properties — and later realized the article explains it in detail. 1)