­Mathias Karlsson (@avlidienbrunn) 's Twitter Profile
­Mathias Karlsson

@avlidienbrunn

Web security fiddler. Bug bounty bastard. Sometimes I cut shapes.

ID: 440767696

calendar_today19-12-2011 11:46:03

1,1K Tweet

16,16K Followers

602 Following

­Mathias Karlsson (@avlidienbrunn) 's Twitter Profile Photo

Did you know that JS supports shebang as a comment, and that multiline comments change behaviour depending on what they contain? Is there more?avlidienbrunn.se/jscomments.php

Gal Weizman (@weizmangal) 's Twitter Profile Photo

So the implementation for the challenge was not great (my bad!) but I did see some interesting answers, as well as the one I expected to see: "location.href = '//redirect.away'; while (1) {}" You must ask yourself - "An infinite loop? How would that work?" Great question 🧵:

Johan Carlsson (@joaxcar) 's Twitter Profile Photo

I have finally done my first proper bug write-up! This one is about a SOP bypass in Chrome (escalated to ATO) using the Navigation API. Hope someone finds it interesting. Feel free to leave me any comments; I want to improve on this! joaxcar.com/blog/2023/10/0…

huli (@aszx87410) 's Twitter Profile Photo

I haven't played CTF for a while cause I am busy with other stuff like new job and moving to a new place(I am in Tokyo now!). But I still see some interesting challenges on twitter from time to time and really want to take a note, so here is it blog.huli.tw/2023/12/03/en/…

Sam Curry (@samwcyo) 's Twitter Profile Photo

This tweet reminded me of a time when I was hacking on Apple's bug bounty program. I found, of all things, a base64 encoded Harry Potter quote on an internal iCloud account debug and administration page. This is the first time I'm sharing this, as more than 90 days have passed

This tweet reminded me of a time when I was hacking on Apple's bug bounty program. I found, of all things, a base64 encoded Harry Potter quote on an internal iCloud account debug and administration page. This is the first time I'm sharing this, as more than 90 days have passed
Brett Buerhaus (@bbuerhaus) 's Twitter Profile Photo

Reversing and Tooling a Signed Request Hash in Obfuscated JavaScript buer.haus/2024/01/16/rev… Thanks to HackingHub for putting together a lab to learn more about it: app.hackinghub.io/surl

Reversing and Tooling a Signed Request Hash in Obfuscated JavaScript

buer.haus/2024/01/16/rev…

Thanks to <a href="/hackinghub_io/">HackingHub</a> for putting together a lab to learn more about it: app.hackinghub.io/surl
Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

I've built a brand new version of my fuzzing tool Shazzer🚀 shazzer.co.uk - Easy fuzz browser behaviour - Find bugs - Share the results with the world

jvoisin (@dustriorg) 's Twitter Profile Photo

Solution to WMCTF2020's Make PHP Great Again 2.0, or how to use filters with `require_once` ­— dustri.org/b/solution-to-…

Thomas Rinsma (@thomasrinsma) 's Twitter Profile Photo

Just released the write-up for CVE-2024-4367, a bug I found recently in PDF.js (and hence in Firefox), resulting in arbitrary JavaScript execution when opening a malicious PDF. codeanlabs.com/blog/research/…

RyotaK (@ryotkak) 's Twitter Profile Photo

I recently developed and posted about a technique called "First sequence sync", expanding James Kettle's single packet attack. This technique allowed me to send 10,000 requests in 166ms, which breaks the packet size limitation of the single packet attack. flatt.tech/research/posts…

Kalmarunionen (@kalmarunionendm) 's Twitter Profile Photo

#𝗞𝗮𝗹𝗺𝗮𝗿𝗖𝗧𝗙 𝟮𝟬𝟮𝟱 𝗶𝘀 𝗷𝘂𝘀𝘁 𝗮𝗿𝗼𝘂𝗻𝗱 𝘁𝗵𝗲 𝗰𝗼𝗿𝗻𝗲𝗿 - 𝗰𝗼𝗺𝗲 𝗰𝗼𝗺𝗽𝗲𝘁𝗲 𝘄𝗶𝘁𝗵 𝘁𝗵𝗲 𝗯𝗲𝘀𝘁 𝗰𝗼𝗺𝗽𝗲𝘁𝗶𝘁𝗶𝘃𝗲 𝗵𝗮𝗰𝗸𝗲𝗿𝘀 𝗳𝗿𝗼𝗺 𝗮𝗿𝗼𝘂𝗻𝗱 𝘁𝗵𝗲 𝘄𝗼𝗿𝗹𝗱 𝗮𝗻𝗱 𝘄𝗶𝗻 𝗴𝗿𝗲𝗮𝘁 𝗽𝗿𝗶𝘇𝗲𝘀! (6x IDAPro from Hex-Rays SA) #CTF

#𝗞𝗮𝗹𝗺𝗮𝗿𝗖𝗧𝗙 𝟮𝟬𝟮𝟱 𝗶𝘀 𝗷𝘂𝘀𝘁 𝗮𝗿𝗼𝘂𝗻𝗱 𝘁𝗵𝗲 𝗰𝗼𝗿𝗻𝗲𝗿 - 𝗰𝗼𝗺𝗲 𝗰𝗼𝗺𝗽𝗲𝘁𝗲 𝘄𝗶𝘁𝗵 𝘁𝗵𝗲 𝗯𝗲𝘀𝘁 𝗰𝗼𝗺𝗽𝗲𝘁𝗶𝘁𝗶𝘃𝗲 𝗵𝗮𝗰𝗸𝗲𝗿𝘀 𝗳𝗿𝗼𝗺 𝗮𝗿𝗼𝘂𝗻𝗱 𝘁𝗵𝗲 𝘄𝗼𝗿𝗹𝗱 𝗮𝗻𝗱 𝘄𝗶𝗻 𝗴𝗿𝗲𝗮𝘁 𝗽𝗿𝗶𝘇𝗲𝘀! (6x IDAPro from <a href="/HexRaysSA/">Hex-Rays SA</a>) #CTF
slonser (@slonser_) 's Twitter Profile Photo

Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

Today I used a technique that’s probably not widely known in the community.
In what cases could code like this lead to a vulnerability? -&gt;
Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

I'm happy to release a script gadgets wiki inspired by the work of Sebastian Lekies, koto, and Eduardo Vela in their Black Hat USA 2017 talk! 🔥 The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs 👇 gmsgadget.com 1/4

I'm happy to release a script gadgets wiki inspired by the work of <a href="/slekies/">Sebastian Lekies</a>, <a href="/kkotowicz/">koto</a>, and <a href="/sirdarckcat/">Eduardo Vela</a> in their Black Hat USA 2017 talk! 🔥

The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs 👇

gmsgadget.com

1/4