
xanhacks
@xanhacks
Web & Malware
- CTF with @Arn_Hack @HexagonCTF @GCC_ENSIBS
- Staff member of @HeroCTF @Flag4jobs
ID: 761269006863048704
https://www.xanhacks.xyz/ 04-08-2016 18:34:09
4,4K Tweet
1,1K Followers
618 Following





For this challenge, it was necessary to abuse a discrepancy between the DOM and the rendered page in Firefox's cache handling 💽 👉 bugzilla.mozilla.org/show_bug.cgi?i… This allows to shift iframe rendering from one to another leading to a sandbox bypass 🔥 👉 mizu.re/post/an-18-yea…



🚨HTTP Request Smuggling in lua-nginx-module!🚨 This affects major proxies like Kong GW, OpenResty, Apache APISIX and many more👀 Check it out: benasin.space/2025/03/18/Ope… Big thanks to James Kettle for his awesome research and for answering all my questions! #bugbounty #bugbountytips


With Flat Network Society we took part in the Insomni'hack finals and we ended up in second place. The Insotransfer challenge was about an RCE on a FastAPI readonly docker instance, enjoy the read :) worty.fr/post/writeups/…



🔥 Understanding Alcatraz ~ Obfuscator Analysis by Utku Çorbacı - Analysis of Alcatraz Passes with IDA - OEP Finder with Qiling Framework - Scripting with IDAPython 0xreverse.com/understanding-…


Checker from Hack The Box has some really complex exploitation steps. There's SQLI in Teampass, SSRF to file read in BookStack using a blind PHP filter oracle, and shared memory abuse. 0xdf.gitlab.io/2025/05/31/htb…



