Thomas Orlita (@thomasorlita) 's Twitter Profile
Thomas Orlita

@thomasorlita

web & browser security

websecblog.com

ID: 771288296739762176

linkhttps://ThomasOrlita.com calendar_today01-09-2016 10:07:14

48 Tweet

704 Takipçi

309 Takip Edilen

Thomas Orlita (@thomasorlita) 's Twitter Profile Photo

Use Google's CSP Evaluator to find ways to bypass CSP on websites using Angular libraries or JSONP endpoints. #XSS Google VRP (Google Bug Hunters) blog.thomasorlita.cz/vulns/google-c…

Thomas Orlita (@thomasorlita) 's Twitter Profile Photo

Bypassing Firebase authorization to create custom goo.gl subdomains or why not to rely on client-side validation. null.app.goo.gl/vuln #BugBounty

Thomas Orlita (@thomasorlita) 's Twitter Profile Photo

Liking GitHub repositories on behalf of other users thanks to a stored XSS in Google's WebComponents.org #XSS #BugBounty blog.thomasorlita.cz/vulns/stored-x…

Thomas Orlita (@thomasorlita) 's Twitter Profile Photo

How I XSSed Google Code-in thanks to the way they were(n't) escaping JSON data. #BugBounty blog.thomasorlita.cz/vulns/google-c…

Thomas Orlita (@thomasorlita) 's Twitter Profile Photo

How I got access to personal data of a million users (and with the help of an XSS also to credit card numbers). #XSS #BugBounty blog.thomasorlita.cz/vulns/leoexpre…

Thomas Orlita (@thomasorlita) 's Twitter Profile Photo

Combining multiple vulnerabilities to insert malware files into Google Earth Studio ZIP archives of thousands of users. #BugBounty #infosec appio.dev/vulns/google-e…

Thomas Orlita (@thomasorlita) 's Twitter Profile Photo

A write-up about how thanks to a vulnerability in Google's Invoice Submission Tool it was possible to execute a blind XSS on behalf of a Google Employee and get access to Google's invoices and internal sites. #BugBounty #InfoSec #XSS appio.dev/vulns/googlepl…

Thomas Orlita (@thomasorlita) 's Twitter Profile Photo

From a self-XSS to a valid XSS with the help of clickjacking on Google.org's Crisis Map. #BugBounty #InfoSec #XSS appio.dev/vulns/clickjac…

Thomas Orlita (@thomasorlita) 's Twitter Profile Photo

Getting all 32000 email addresses of every registered user on Google.org’s Crisis Map thanks to IDOR and incremental IDs. #BugBounty #InfoSec websecblog.com/vulns/listing-…

Thomas Orlita (@thomasorlita) 's Twitter Profile Photo

Getting confidential information about upcoming Google Cloud products from unrestricted draft blog post images. #BugBounty #InfoSec websecblog.com/vulns/public-g…

FD (@filedescriptor) 's Twitter Profile Photo

Untrusted Types just got a new UI with better filtering options and features thanks to Thomas Orlita! Check it out! github.com/filedescriptor…

Untrusted Types just got a new UI with better filtering options and features thanks to <a href="/ThomasOrlita/">Thomas Orlita</a>! Check it out! 

github.com/filedescriptor…
Thomas Orlita (@thomasorlita) 's Twitter Profile Photo

Overview of different vulnerabilities in Google's new web-based collaboration tool Threadit: XSS, Clickjacking, ACL bypass, Info leak... #BugBounty #InfoSec websecblog.com/vulns/google-t…

NDevTK (@ndevtk) 's Twitter Profile Photo

Bug write-up for Google Extensions thanks Thomas Orlita and others for the help :) ndevtk.github.io/writeups/2023/… this writeup does include some free XSSs I got board of waiting.