Borgi (@aymenborgi) 's Twitter Profile
Borgi

@aymenborgi

Security Researcher - Penetration Tester @Ericsson

ID: 1013885370365349888

calendar_today02-07-2018 20:41:24

144 Tweet

257 Followers

979 Following

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Part 2 of the blog describing the #Firefox bug used by Manfred Paul at #Pwn2Own Vancouver is live. Hossein Lotfi continues looking at the code execution bug with sandbox escape that won $100K at the event. Read the details (and watch the video demo) at zerodayinitiative.com/blog/2022/8/23…

slonser (@slonser_) 's Twitter Profile Photo

A writeup analysis of a simple logical vulnerability at Chrome for which Google VRP (Google Bug Hunters) paid me $16,000. Link: blog.slonser.info/posts/cve-2023… P.S. I have very few subscribers, so I am grateful for every repost #0day #Chrome #GoogleVRP #CVE

Ryan M. Montgomery (@0dayctf) 's Twitter Profile Photo

CVE-2024-1086 (Local Privilege Escalation) - While the xz backdoor was all over the place, this incredible exploit seemed to "slip" by! - This is working on most Linux kernels from 5.14 to v6.6 - Repo: github.com/Notselwyn/CVE-… - Creator: Lau

CVE-2024-1086 (Local Privilege Escalation) 
-
While the xz backdoor was all over the place, this incredible exploit seemed to "slip" by!
-
This is working on most Linux kernels from 5.14 to v6.6
-
Repo: github.com/Notselwyn/CVE-…
-
Creator: <a href="/notselwyn/">Lau</a>
PT SWARM (@ptswarm) 's Twitter Profile Photo

🧧 Our researcher Igor Sak-Sakovskiy has discovered an XXE in Chrome and Safari by ChatGPT! Bounty: $28,000 💸 Here is the write-up 👉 swarm.ptsecurity.com/xxe-chrome-saf…

🧧 Our researcher Igor Sak-Sakovskiy has discovered an XXE in Chrome and Safari by ChatGPT!

Bounty: $28,000 💸

Here is the write-up 👉
swarm.ptsecurity.com/xxe-chrome-saf…
DEVCORE (@d3vc0r3) 's Twitter Profile Photo

🚀 Finally released the details of the MikroTik RouterOS exploit that won us the Master of Pwn at #Pwn2Own Toronto 2022! 🎖 Curious about how we did it? Check out the latest blog revealing the attack chain: devco.re/blog/2024/05/2…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

CVE-2024-30043: Piotr Bazydło details this #SharePoint XXE he discovered. He calls it one of the craziest XXEs he has ever seen, both in terms of vuln discovery and the method of triggering. He shows how it can be used for info disclosure & NTLM relaying. zerodayinitiative.com/blog/2024/5/29…

elttam (@elttam) 's Twitter Profile Photo

New blog post: plORMbing your Django ORM - Part one of a series about ORM Leak vulnerabilities and attacking the Django ORM. elttam.com/blog/plormbing…

Luca Carettoni (@lucacarettoni) 's Twitter Profile Photo

After months of work (and bugs), Maxence SCHMITT has finally released his fabulous research. Exploiting Client-Side Path Traversal to Perform Cross-Site Request Forgery or #CSPT2CSRF. Full paper here: doyensec.com/resources/Doye… Summary in blog.doyensec.com/2024/07/02/csp…

After months of work (and bugs), <a href="/maxenceschmitt/">Maxence SCHMITT</a> has finally released his fabulous research. Exploiting Client-Side Path Traversal to Perform Cross-Site Request Forgery or #CSPT2CSRF. 

Full paper here: doyensec.com/resources/Doye…

Summary in blog.doyensec.com/2024/07/02/csp…
Sonar Research (@sonar_research) 's Twitter Profile Photo

🔥 XSS on any website with missing charset information? 😳 Attackers may leverage the ISO-2022-JP character encoding to inject arbitrary JavaScript code into a website. Read more in our latest blog post: sonarsource.com/blog/encoding-… #appsec #security #vulnerability

🔥 XSS on any website with missing charset information? 😳

Attackers may leverage the ISO-2022-JP character encoding to inject arbitrary JavaScript code into a website. Read more in our latest blog post:

sonarsource.com/blog/encoding-…

#appsec #security #vulnerability
Rebane (@rebane2001) 's Twitter Profile Photo

new blogpost time!! this one's a fun writeup on a vulnerability chain i found across multiple google services that earned me a $4133.70 bounty lots of fun css as usual! i had to recreate a bunch of drive/docs/gmail/youtube UIs c: have fun! lyra.horse/blog/2024/09/u…

Jorian (@j0r1an) 's Twitter Profile Photo

During a recent CTF, one participant found a particularly interesting solution to my challenge. The goal was to send multiple CSRF requests with SameSite=Lax from 1 visit. Normally, a form sends you to the page you are posting to and you cannot send any more CSRF requests. (1/4)

/RootedCON (@rootedcon) 's Twitter Profile Photo

Ya tenemos ganador de la última #HackerNight, la cual hicimos con la colaboración de Yogosha y en la que Rooted ha añadido 3.000€ adicionales. Enhorabuena Borgi por encontrar la mejor vulnerabilidad.🥳👏 Y gracias a todos los que participasteis. ¡Nos vemos en la

Stephen Fewer (@stephenfewer) 's Twitter Profile Photo

We have just published our AttackerKB Rapid7 Analysis for CVE-2024-47575, the recent FortiManager 0day, aka FortiJump 🔥 Read our full technical analysis; detailing firmware decryption, protocol analysis, and unauthenticated RCE 🚀 attackerkb.com/topics/OFBGprm…

cts🌸 (@gf_256) 's Twitter Profile Photo

My videos for Flare-On 2024 are live! Watch me reverse engineer all the challenges from start to end. + Commentary video featuring SuperFashi, where we review the chals together. * 45 hours of content * 400+ GB of raw footage Merry Christmas! youtube.com/watch?v=vwW9xv…

slonser (@slonser_) 's Twitter Profile Photo

In 2024, I interacted a lot with Extensions. I decided to create a resource that will help with a basic understanding of extensions and key attacks. P.S. I tried to make everything as clear as possible and hope it won’t feel too overwhelming anywhere. extensions.neplox.security

Victor Fresk0 (@hacefresko) 's Twitter Profile Photo

Good news! I've uploaded a new post about the most complex and beautiful vulnerability I've ever found, involving patching and uploading deprecated .jar libraries to get RCE on a big target. It's a very technical post, but I hope you like it ! :) hacefresko.com/posts/rce-on-s…

PT SWARM (@ptswarm) 's Twitter Profile Photo

🔥 The "impossible" XXE in PHP? Not so impossible anymore. Our researcher Aleksandr Zhurnakov discovered an interesting combination of PHP wrappers and a feature of XML parsing in libxml2 to exploit it. Read: swarm.ptsecurity.com/impossible-xxe…

🔥 The "impossible" XXE in PHP? Not so impossible anymore.

Our researcher Aleksandr Zhurnakov discovered an interesting combination of PHP wrappers and a feature of XML parsing in libxml2 to exploit it.

Read: swarm.ptsecurity.com/impossible-xxe…
d4d (@d4d89704243) 's Twitter Profile Photo

I’m excited to introduce Namespace Confusion, a novel attack discovered during Gareth's and mySAML Roulette: The Hacker Always Wins research. We uncovered a brutal attack on XML signature validation that destroys authentication in Ruby-SAML!

I’m excited to introduce Namespace Confusion, a novel attack discovered during Gareth's and mySAML Roulette: The Hacker Always Wins research. We uncovered a brutal attack on XML signature validation that destroys authentication in Ruby-SAML!
watchTowr (@watchtowrcyber) 's Twitter Profile Photo

Our client base has been feeding us rumours about in-the-wild exploited SonicWall SMA n-days (CVE-2023-44221, CVE-2024-38475) for a while... Given these are now CISA KEV, enjoy our now public analysis and reproduction :-) labs.watchtowr.com/sonicboom-from…

watchTowr (@watchtowrcyber) 's Twitter Profile Photo

The watchTowr Labs team is back, providing our full analysis of the Oracle E-Business Suite Pre-Auth RCE exploit chain (CVE-2025-61882). Enjoy with us (or cry, your choice..) labs.watchtowr.com/well-well-well…