Ansar Uddin
@ansar0047
Love to pwn system !
bugcrowd.com/Security47
ID: 1341455661314363392
22-12-2020 18:49:18
424 Tweet
1,1K Takipçi
610 Takip Edilen
Couldn't make Gareth Heyes \u2028 Splitting the Email Atom event earlier this week? We'll be sharing the recording on our Discord next week. 👀 Make sure you've joined the official PortSwigger Discord 👉 discord.com/invite/portswi…
During x3CTF, I discovered an unintended solution that turned out to be a pretty cool generic technique. It allows you to detect the result of a selector during CSS Injection, bypassing any CSP restricting external requests! Check out the writeup below: jorianwoltjer.com/blog/p/ctf/x3c…
Sometimes, SQL injection is still possible, even when prepared statements are being used. Our researcher hashkitten has written up a blog post about a novel technique for SQL Injection in PDO’s prepared statements: slcyber.io/assetnote-secu…
My favourite finding from Searchlight Cyber's Security Research team in 2025 so far is a secondary context path traversal in Omnissa Workspace One UEM (CVE-2025-25231). Really interesting bug, and fun kill chain to RCE. slcyber.io/assetnote-secu…
Today, we’re releasing watchTowr Labs’ Piotr Bazydło’s BlackHat .NET research, owning Barracuda, Ivanti and more solutions. Enjoy the read as Piotr explains a new .NET Framework primitive, used to achieve pre- and post-auth RCE on numerous enterprise appliances.
We got frustrated with dealing with vendor dependencies when reverse engineering large applications. Patrik Grobshäuser from Searchlight Cyber’s Sec Research Team built Hyoktesu to solve this problem forever: github.com/assetnote/hyok… - releasing this today! Blog: slcyber.io/research-cente…