Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile
Kévin GERVOT (Mizu)

@kevin_mizu

Researcher for @ctbbpodcast lab 🐛 | DOMLogger++ developer 👨🏻‍💻 | CTF with @FlatNetworkOrg, @rhackgondins 🦦 | @ECSC_TeamFrance 2023 🇫🇷

ID: 866258514196484096

linkhttps://mizu.re/ calendar_today21-05-2017 11:44:58

973 Tweet

5,5K Followers

713 Following

‌Renwa (@renwax23) 's Twitter Profile Photo

CVE-2025-30466: Safari <18.4 UXSS to bypass Same-Origin Policy with CVSS of Critical 9.8 🔴 ;) support.apple.com/en-us/122379#:…

shubs (@infosec_au) 's Twitter Profile Photo

IP whitelisting is fundamentally broken. At Assetnote, we've successfully bypassed network controls by routing traffic through a specific location (cloud provider, geo-location). Today, we're releasing Newtowner, to help test for this issue: github.com/assetnote/newt…

shubs (@infosec_au) 's Twitter Profile Photo

I won the Most Valuable Hacker award for the Salesforce H1-6102 live hacking event in Sydney (my hometown)! I enjoyed working with some very talented hackers, including RyotaK, Geluchat, and Kévin GERVOT (Mizu). This is my third MVH award, and I'm grateful to be able to compete.

James Kettle (@albinowax) 's Twitter Profile Photo

I'm thrilled to announce "HTTP/1 Must Die! The Desync Endgame" is coming to #DEFCON33! This talk will feature multiple new classes of desync attack, mass exploitation spanning multiple CDNs, and over $200k in bug bounties. See you there!

I'm thrilled to announce "HTTP/1 Must Die! The Desync Endgame" is coming to #DEFCON33!  This talk will feature multiple new classes of desync attack, mass exploitation spanning multiple CDNs, and over $200k in bug bounties. See you there!
Sonar Research (@sonar_research) 's Twitter Profile Photo

SQL Injection despite using prepared statements? 🧐 Turns out that SQL syntax can be ambiguous! Learn how this has led to vulnerabilities in several popular PostgreSQL client libraries: sonarsource.com/blog/double-da… #appsec #security #vulnerability

Lupin (@0xlupin) 's Twitter Profile Photo

2 AM in a Tokyo hotel room: Assetnote x Depi find a Dependency Confusion vuln that lands RCE on Netflix ! 🚀 Shout-out to shubs for the "keep digging" spark & Netflix security for stellar triage. Full write-up in thread 🧵

2 AM in a Tokyo hotel room: <a href="/assetnote/">Assetnote</a>  x Depi find a Dependency Confusion vuln that lands RCE on Netflix !

🚀 Shout-out to <a href="/infosec_au/">shubs</a>  for the "keep digging" spark &amp; Netflix security for stellar triage. Full write-up in thread 🧵
Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

🚨 Heads up for web devs! 🚨 The HTML spec just got an important update to protect against mutation XSS (mXSS). Find out how escaping < and > in attributes is making the web a safer place. bughunters.google.com/blog/503874286…

HackerOne (@hacker0x01) 's Twitter Profile Photo

Congrats to these award winners for their innovation, collaboration, and relentless pursuit of impact. 🔥 Most Valuable Hacker | Top Criticality, Community, & Consistency of the event >>WINNER: shubs 🕷️ Exterminator | Best/most Impactful bug of the event >>WINNERS:

Congrats to these award winners for their innovation, collaboration, and relentless pursuit of impact.

🔥 Most Valuable Hacker | Top Criticality, Community, &amp; Consistency of the event
&gt;&gt;WINNER: shubs

🕷️ Exterminator | Best/most Impactful bug of the event 
&gt;&gt;WINNERS:
s1r1us (@s1r1u5_) 's Twitter Profile Photo

Hacking Windsurf: I asked the AI for the shell, it said yes. new video’s out. I show how I could’ve hacked you… just by getting you to click my link. Link posted below.

Hacking Windsurf: I asked the AI for the shell, it said yes.

new video’s out. I show how I could’ve hacked you… just by getting you to click my link.

Link posted below.
James Kettle (@albinowax) 's Twitter Profile Photo

"Funky chunks: abusing ambiguous chunk line terminators for request smuggling" - quality research by Jeppe Weikop! Also thankfully it doesn't overlap with my upcoming presentation 😅 w4ke.info/2025/06/18/fun…

Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

If you love client-side challenges, I highly recommend checking this one out! I'm sure you'll learn something new, amazing challenge by ToG 🔥

shubs (@infosec_au) 's Twitter Profile Photo

How do we turn bad SSRF (blind) into good SSRF (full response)? The Assetnote Security Research team at Searchlight Cyber used a novel technique involving HTTP redirect loops and incremental status codes that leaked the full HTTP resp. It may work elsewhere! slcyber.io/assetnote-secu…

How do we turn bad SSRF (blind) into good SSRF (full response)? The <a href="/assetnote/">Assetnote</a> Security Research team at <a href="/SLCyberSec/">Searchlight Cyber</a> used a novel technique involving HTTP redirect loops and incremental status codes that leaked the full HTTP resp. It may work elsewhere! slcyber.io/assetnote-secu…
Charles Fol (@cfreal_) 's Twitter Profile Photo

lightyear just got 6 times faster! Although I now work at Synacktiv, I proposed a PR for the tool to support threading and compression, greatly reducing the time required to dump a file. Dumping the demo /etc/passwd now takes 48s instead of 5m30. github.com/ambionics/ligh…

Worty (@_worty) 's Twitter Profile Photo

This weekend, for the Midnight Flag CTF final, I created a web challenge called JavaNote, which asked players to modify the ysoserial tool to do something other than execute a command, you can read the write-up here: worty.fr/post/writeups/… Congratulations again to all the players!