Jorian (@j0r1an) 's Twitter Profile
Jorian

@j0r1an

Normalize being weird. (also here: bsky.app/profile/jorianโ€ฆ)

ID: 1197601030634188800

linkhttps://jorianwoltjer.com calendar_today21-11-2019 19:42:00

159 Tweet

730 Followers

311 Following

Jorian (@j0r1an) 's Twitter Profile Photo

Small tip for the JavaScript reverse engineers out there, Chrome has a `debug()` function which triggers a breakpoint whenever its first argument is called. It even works on built-in methods, no more wrapping stuff in proxies :D debug(DOMParser.prototype.parseFromString)

Small tip for the JavaScript reverse engineers out there, Chrome has a `debug()` function which triggers a breakpoint whenever its first argument is called. It even works on built-in methods, no more wrapping stuff in proxies :D

debug(DOMParser.prototype.parseFromString)
slonser (@slonser_) 's Twitter Profile Photo

My new research Escalation of Self-XSS to XSS using modern browser capabilities. blog.slonser.info/posts/make-selโ€ฆ

Jorian (@j0r1an) 's Twitter Profile Photo

Many great techniques covered in this writeup for different cheesy ๐Ÿง€ strategies and client-side fun. Show them some love! I promise you'll learn something new:

Intigriti (@intigriti) 's Twitter Profile Photo

โฐ It's CHALLENGE O'CLOCK! ๐Ÿ‘‰ Capture the flag before Thursday the 26th of June ๐Ÿ‘‰ Win โ‚ฌ400 in SWAG prizes ๐Ÿ‘‰ We'll release a tip for every 100 likes on this tweet Thanks ToG for the challenge ๐Ÿ‘‡ challenge-0625.intigriti.io

โฐ It's CHALLENGE O'CLOCK!
๐Ÿ‘‰ Capture the flag before Thursday the 26th of June
๐Ÿ‘‰ Win โ‚ฌ400 in SWAG prizes
๐Ÿ‘‰ We'll release a tip for every 100 likes on this tweet

Thanks <a href="/Toogidog/">ToG</a> for the challenge ๐Ÿ‘‡

challenge-0625.intigriti.io
Jorian (@j0r1an) 's Twitter Profile Photo

This is a Public Service Announcement to all client-side challenge authors: *XSS on any localhost origin makes RCE possible on selenium!*

Intigriti (@intigriti) 's Twitter Profile Photo

โฐ It's CHALLENGE O'CLOCK! ๐Ÿ‘‰ Pop an alert before Friday the 18th of July ๐Ÿ‘‰ Win โ‚ฌ400 in SWAG prizes ๐Ÿ‘‰ We'll release a tip for every 100 likes on this tweet Thanks Jorian for the challenge ๐Ÿ‘‡ challenge-0725.intigriti.io

โฐ It's CHALLENGE O'CLOCK!
๐Ÿ‘‰ Pop an alert before Friday the 18th of July
๐Ÿ‘‰ Win โ‚ฌ400 in SWAG prizes
๐Ÿ‘‰ We'll release a tip for every 100 likes on this tweet
Thanks <a href="/J0R1AN/">Jorian</a> for the challenge ๐Ÿ‘‡
challenge-0725.intigriti.io
Meydi (@neotrony) 's Twitter Profile Photo

A tiny blog post of mine about exploiting self-XSS using disk cacheโ€” inspired by Jorian Hope you like it! mey-d.github.io/posts/self-xssโ€ฆ

Jorian (@j0r1an) 's Twitter Profile Photo

I made a hard one ๐Ÿ˜… But, it involves some very interesting Mutation XSS & DOM Clobbering fun combined with a CSP Bypass using the powerful SocketIO gadget. Everything's explained in my writeup below! jorianwoltjer.com/blog/p/ctf/intโ€ฆ