Amirabbas Ataei (@imayrix) 's Twitter Profile
Amirabbas Ataei

@imayrix

Bug Hunter & Web Application Pentester

ID: 1438514705924984834

calendar_today16-09-2021 14:46:56

881 Tweet

3,3K Followers

515 Following

LIL NIX (@thelilnix) 's Twitter Profile Photo

This was the XSS payload that I used to bypass Akamai WAF: ' oncontent\visibilityautostatechange='a=alert,(a?a:a)(origin)' x=\v+styl\u0065='content-visibility:auto #bugbountytips #bugbounty #lil_tips Let me explain why it's working👇

LIL NIX (@thelilnix) 's Twitter Profile Photo

When you use "Tagged Templates" (e.g, alert`123`), JavaScript passes something like this to the function: alert(["123"]) NOTE: Since alert uses "toString" on the given parameter, it becomes ["123"].toString() and then "123".

When you use "Tagged Templates" (e.g, alert`123`), JavaScript passes something like this to the function:
alert(["123"])
NOTE: Since alert uses "toString" on the given parameter, it becomes ["123"].toString() and then "123".
YS (@yshahinzadeh) 's Twitter Profile Photo

first time participating in NahamCon. I’ll cover a practical attack scenario I've made $50K with. Hope everything goes well for me

first time participating in NahamCon. I’ll cover a practical attack scenario I've made $50K with. Hope everything goes well for me
YS (@yshahinzadeh) 's Twitter Profile Photo

just wrote a blog post based on this technique and described the methodology to take advantage of it, the post also includes an easy-to-set-up testbed to practice with, hope you find it useful blog.voorivex.team/leaking-oauth-…

just wrote a blog post based on this technique and described the methodology to take advantage of it, the post also includes an easy-to-set-up testbed to practice with, hope you find it useful
blog.voorivex.team/leaking-oauth-…
AmirMohammad Safari (@amirmsafari) 's Twitter Profile Photo

We’ve created a lab to demonstrate how an OAuth token can be leaked using a referrer policy override. Check out the article and try the lab here github.com/VoorivexTeam/w…

Omid Rezaei (@omidxrz) 's Twitter Profile Photo

YS and I created two postMessage challenges based on real-world cases, it's commonly used by developers to secure postMessages this is the first one, can you exploit it?

<a href="/YShahinzadeh/">YS</a> and I created two postMessage challenges based on real-world cases, it's commonly used by developers to secure postMessages
this is the first one, can you exploit it?
Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

What do you get when you mix punycode and 0-click account takeover? A talk you absolutely don’t want to miss. @yshahinzadeh & @amirmsafari are teaming up at #NahamCon2025 to walk you through a wild exploit chain 🔥 🗓️ May 23 📍 nahamcon.com

What do you get when you mix punycode and 0-click account takeover?
A talk you absolutely don’t want to miss.
@yshahinzadeh &amp; @amirmsafari are teaming up at #NahamCon2025 to walk you through a wild exploit chain 🔥

🗓️ May 23
📍 nahamcon.com
YS (@yshahinzadeh) 's Twitter Profile Photo

How did we (AmirMohammad Safari) earn $50k using the Punycode technique? I’ve published a detailed blog post about our recent talk, we included 3 attack scenarios, one of which poses a high risk of account takeover on any "Login with GitLab" implementation blog.voorivex.team/puny-code-0-cl…

slonser (@slonser_) 's Twitter Profile Photo

My new research Escalation of Self-XSS to XSS using modern browser capabilities. blog.slonser.info/posts/make-sel…

YS (@yshahinzadeh) 's Twitter Profile Photo

this one is going to be paid $10k, public program. I think I should drop a blog post on it because it had a tricky WAF bypass. But for a quick note: I used the <base> tag to bypass the CSP, Payload: param1=+href=https://attsite%20%22&param2=href%22%3E%3Cbase%20

this one is going to be paid $10k, public program. I think I should drop a blog post on it because it had a tricky WAF bypass. But for a quick note: I used the &lt;base&gt; tag to bypass the CSP, Payload:

param1=+href=https://attsite%20%22&amp;param2=href%22%3E%3Cbase%20
Sky Desperados (@jusxing) 's Twitter Profile Photo

After my first year of full-time bug hunting, I successfully completed Justin’s Challenge on HackerOne . I want to share a few things that might help beginners. The bugs I’ve earned the most from are IDOR and XSS — they’re great to focus on when you're getting started. One

After my first year of full-time bug hunting, I successfully completed Justin’s Challenge on <a href="/Hacker0x01/">HackerOne</a> .

I want to share a few things that might help beginners. The bugs I’ve earned the most from are IDOR and XSS — they’re great to focus on when you're getting started.

One
Omid Rezaei (@omidxrz) 's Twitter Profile Photo

after many unlucky moments in bug bounty, july was fun with interesting findings, I made around $30k bounty, mostly from XSS and OAuth in august, I've planned to dive deeper into client-side stuff

after many unlucky moments in bug bounty, july was fun with interesting findings, I made around $30k bounty, mostly from XSS and OAuth 
in august, I've planned to dive deeper into client-side stuff