mrroot (@_mohd_saqlain) 's Twitter Profile
mrroot

@_mohd_saqlain

Application Security Engineer | bbhunter.com/mrrootsec

ID: 2219265548

linkhttps://mrrootsec.vercel.app calendar_today28-11-2013 09:03:25

2,2K Tweet

862 Followers

404 Following

Brett Buerhaus (@bbuerhaus) 's Twitter Profile Photo

Reversing and Tooling a Signed Request Hash in Obfuscated JavaScript buer.haus/2024/01/16/rev… Thanks to HackingHub for putting together a lab to learn more about it: app.hackinghub.io/surl

Reversing and Tooling a Signed Request Hash in Obfuscated JavaScript

buer.haus/2024/01/16/rev…

Thanks to <a href="/hackinghub_io/">HackingHub</a> for putting together a lab to learn more about it: app.hackinghub.io/surl
André Baptista (@0xacb) 's Twitter Profile Photo

Did you know an input can use the form attribute to link to a form by ID letting it submit with the form even if it’s placed outside of it!? 👀  In this PHP example, an input outside the form adds a URL argument and only the second parm value (1337) is echoed. S/O to Andreas Söderlund

Did you know an input can use the form attribute to link to a form by ID letting it submit with the form even if it’s placed outside of it!? 👀 

In this PHP example, an input outside the form adds a URL argument and only the second parm value (1337) is echoed.

S/O to <a href="/encodeart/">Andreas Söderlund</a>
Louis Nyffenegger (@snyff) 's Twitter Profile Photo

Let's create a certification... The exam: you find (and fix or get fixed) 12 issues in different open source projects with more than 10k stars on GitHub.

harisec (@har1sec) 's Twitter Profile Photo

Here are the slides from my TumpiCon talk: Teaching LLMs how to XSS - An introduction to fine-tuning and reinforcement learning (using your own GPU) docs.google.com/presentation/d…

Gunnar Andrews (@g0lden_infosec) 's Twitter Profile Photo

I am really trying to focus on some hands-on hacking recently, and more specifically I have been focused on client-side topics. Here is a little primer of tools/resources I have used and looked at so far :) Share yours with me! <3 youtu.be/y9hffgd8ikw

I am really trying to focus on some hands-on hacking recently, and more specifically I have been focused on client-side topics. Here is a little primer of tools/resources I have used and looked at so far :) Share yours with me! &lt;3
youtu.be/y9hffgd8ikw
chux (@chux13786509) 's Twitter Profile Photo

Hackers 🔥 I’ve set up this Nginx that forwards traffic to a Flask server and blocks access to /secret - throwing 403 🛑 Can you find a way to bypass this restriction and access /secret? 🥷 Drop your ideas or tricks in the replies — let’s see how creative you can get! ⚡️

Hackers 🔥
I’ve set up this Nginx that forwards traffic to a Flask server and blocks access to /secret - throwing 403 🛑
Can you find a way to bypass this restriction and access /secret? 🥷
Drop your ideas or tricks in the replies — let’s see how creative you can get! ⚡️
ramsexy (@plmaltais) 's Twitter Profile Photo

Just dropped a new CSP bypass for salesforce.com on cspbypass.com : <script src="omtr2.partners.salesforce.com/id?callback=al…"></script>

GMO Flatt Security Inc. (@flatt_sec_en) 's Twitter Profile Photo

New blog out! Think XSS is a thing of the past with today's Web frameworks? Think again! Our new article by canalun breaks down why this vulnerability persists and offers insights on how to stay secure. Read it here! flatt.tech/research/posts…

Sam Curry (@samwcyo) 's Twitter Profile Photo

When applying for a job at McDonald's, over 90% of franchises use "Olivia," an AI-powered chatbot. We (Ian Carroll and I) discovered a vulnerability that could allow an attacker to access the over 64 million chat records using the password "123456". ian.sh/mcdonalds

dbugs (@ptdbugs) 's Twitter Profile Photo

1/4 dbugs LIVE dbugs.ptsecurity.com — vulnerabilities’ home See trends, discover more, read AI summaries, have all references at hand, and your profile with all your CVEs and CVSS score on a leaderboard. ⬇️ See thread: what’s live + what’s next ⬇️

1/4 dbugs LIVE

dbugs.ptsecurity.com — vulnerabilities’ home

See trends, discover more, read AI summaries, have all references at hand, and your profile with all your CVEs and CVSS score on a leaderboard.

⬇️ See thread: what’s live + what’s next ⬇️
Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

I'm happy to release a script gadgets wiki inspired by the work of Sebastian Lekies, koto, and Eduardo Vela in their Black Hat USA 2017 talk! 🔥 The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs 👇 gmsgadget.com 1/4

I'm happy to release a script gadgets wiki inspired by the work of <a href="/slekies/">Sebastian Lekies</a>, <a href="/kkotowicz/">koto</a>, and <a href="/sirdarckcat/">Eduardo Vela</a> in their Black Hat USA 2017 talk! 🔥

The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs 👇

gmsgadget.com

1/4
sapir federovsky (@sapirxfed) 's Twitter Profile Photo

This post is SO GOOD! I knew nothing about easy auth, It's so interesting! And the abuse ideas are so creative! It's not the first time i see how env variables on app lead to such things (See MI research by NetSpy). Go read it! dazesecurity.io/blog/abusingEa…

Ethiack (@ethiack) 's Twitter Profile Photo

What happens when a WAF blocks every XSS payload you throw at it? You get creative. 🔗 Read the full blog post: blog.ethiack.com/blog/bypassing…

jeppojeps bsky social (@jeppojeps) 's Twitter Profile Photo

For YOU interested in JS exploitation: 2nd episode dissecting the current state of the art. Ready for fakeobj() ? We are looking for you at fuzzsociety.org to learn vulnerability research together, from scratch. youtu.be/hZU_KsShXGk +slides +docker