
xanhacks
@xanhacks
Web & Malware
- CTF with @Arn_Hack @HexagonCTF @GCC_ENSIBS
- Staff member of @HeroCTF @Flag4jobs
ID: 761269006863048704
https://www.xanhacks.xyz/ 04-08-2016 18:34:09
4,4K Tweet
1,1K Takipçi
618 Takip Edilen








🚨HTTP Request Smuggling in lua-nginx-module!🚨 This affects major proxies like Kong GW, OpenResty, Apache APISIX and many more👀 Check it out: benasin.space/2025/03/18/Ope… Big thanks to James Kettle for his awesome research and for answering all my questions! #bugbounty #bugbountytips


With Flat Network Society we took part in the Insomni'hack finals and we ended up in second place. The Insotransfer challenge was about an RCE on a FastAPI readonly docker instance, enjoy the read :) worty.fr/post/writeups/…



🔥 Understanding Alcatraz ~ Obfuscator Analysis by Utku Çorbacı - Analysis of Alcatraz Passes with IDA - OEP Finder with Qiling Framework - Scripting with IDAPython 0xreverse.com/understanding-…



Checker from Hack The Box has some really complex exploitation steps. There's SQLI in Teampass, SSRF to file read in BookStack using a blind PHP filter oracle, and shared memory abuse. 0xdf.gitlab.io/2025/05/31/htb…



