
Erik Donker
@kire_devs_hacks
I develop stuff and I hack things. #6 Microsoft MSRC 2024 Most Valuable Researcher. Two times consecutive #1 Dynamics 365/Power Platform security researcher.
คุณอาจชื่นชอบ
A little bit about what Shift Agents can do! Even Caido got hacked. Hahahah
Small tip for the JavaScript reverse engineers out there, Chrome has a `debug()` function which triggers a breakpoint whenever its first argument is called. It even works on built-in methods, no more wrapping stuff in proxies :D debug(DOMParser.prototype.parseFromString)

How did we (@AmirMSafari) earn $50k using the Punycode technique? I’ve published a detailed blog post about our recent talk, we included 3 attack scenarios, one of which poses a high risk of account takeover on any "Login with GitLab" implementation blog.voorivex.team/puny-code-0-cl…
My first 10.0 CVE ;)
[1/7] 🚨 @Microsoft just patched CVE-2025-29813, a severe Azure DevOps vulnerability with a perfect CVSS score of 10.0! This flaw allowed attackers to swap short-term pipeline tokens for long-term ones, potentially extending their access. No user action needed. @AzureDevOps
![gothburz's tweet image. [1/7] 🚨 @Microsoft just patched CVE-2025-29813, a severe Azure DevOps vulnerability with a perfect CVSS score of 10.0! This flaw allowed attackers to swap short-term pipeline tokens for long-term ones, potentially extending their access. No user action needed. @AzureDevOps](https://pbs.twimg.com/media/Gqg59t6XwAAZYfM.jpg)
Ok, so @slonser_, some of the folks in the CTBB discord, and I (@rhynorater) did a bit of follow-up on this and found a couple more useful primitives:
Awesome technique by @slonser_! With this method, you can leak sensitive data using just an 'img' tag, even if the target uses DOMPurify and CSS data exfiltration is not possible

Uh wow, ok, I guess we're back to image injection -> query param leak again. @shhnjk you seen this?
Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

This one is from bugbounty target , funny... you will not able to bypass this year ago, Reply with your solution

I wrote about Hackbots on the @Hacker0x01 site! It covers what they are, where they're at now, and most importantly where it's all heading 😊 I hope you'll check it out! Link in first reply.

Blind CSS exfiltration attacks recently got a lot easier! Full details in this thread:
I think many people are familiar with the topic of blind CSS exfiltration, especially after the post by @garethheyes However, an important update has occurred since then, which I wrote below ->
I think many people are familiar with the topic of blind CSS exfiltration, especially after the post by @garethheyes However, an important update has occurred since then, which I wrote below ->
Somehow, Chrome 130+ started parsing the hostname from javascript URLs again and this can be used for a constrained XSS 🤯 challenges.ethiack.ninja/leak-the-secre… This was the second solution for the recent CTF challenge.
👨💻 Can you spot the vulnerability? 👇 Let's see in the comments if you can figure out the CSP bypass to trigger an XSS 💉 🔗 Link in the comments to try your payload!

You might have noticed that the recent SAML writeups omit some crucial details. In "SAML roulette: the hacker always wins", we share everything you need to know for a complete unauthenticated exploit on ruby-saml, using GitLab as a case-study. portswigger.net/research/saml-…
At @nullcon Goa, Michael Hendrickx (@ndrix), Principal Security Research Manager at Microsoft, presented Project Dusseldorf: Finding Out-of-Band Vulnerabilities at Cloud Scale. Project Dusseldorf is an internal tool used by Microsoft’s red teams and application security teams to…

For this challenge, it was necessary to abuse a discrepancy between the DOM and the rendered page in Firefox's cache handling 💽 👉 bugzilla.mozilla.org/show_bug.cgi?i… This allows to shift iframe rendering from one to another leading to a sandbox bypass 🔥 👉 mizu.re/post/an-18-yea…
With @Geluchat, we created a challenge for the @pwnmectf inspired by a bug he found in bug bounty a year ago! 🚀 If you have some time this weekend, give it a try! 👀 👉 pwnme.phreaks.fr

This is a great infoleak exploit chain targeting YouTube by @brutecat. Love the use of a DoS flaw to make the attack stealthier! brutecat.com/articles/leaki…
brutecat.com
Leaking the email of any YouTube user for $10,000
What could've been the largest data breach in the world - an attack chain on Google services to leak the email address of any YouTube channel
I'm very happy to finally share the second part of my DOMPurify security research 🔥 This article mostly focuses on DOMPurify misconfigurations, especially hooks, that downgrade the sanitizer's protection (even in the latest version)! Link 👇 mizu.re/post/exploring… 1/2
We just released a new article on how we made 50,000$ in #BugBounty by doing a really cool Software Supply Chain Attack🔥 🔗Link: landh.tech/blog/20250211-…

United States เทรนด์
- 1. Flacco 87.7K posts
- 2. Bengals 82K posts
- 3. Bengals 82K posts
- 4. #clubironmouse 3,456 posts
- 5. Tomlin 22.2K posts
- 6. #Talisman 8,535 posts
- 7. #criticalrolespoilers 8,596 posts
- 8. #SEVENTEEN_NEW_IN_LA 51.3K posts
- 9. Jalen Ramsey 8,167 posts
- 10. #WhoDidTheBody 1,645 posts
- 11. yeonjun 120K posts
- 12. Chase 106K posts
- 13. Chase 106K posts
- 14. Cuomo 88.2K posts
- 15. Teryl Austin 2,870 posts
- 16. Xenoverse 3 N/A
- 17. Tame Impala 5,848 posts
- 18. Max Scherzer 14.9K posts
- 19. Mousey 1,264 posts
- 20. Ace Frehley 104K posts
คุณอาจชื่นชอบ
-
Thomas Seigneuret
@_zblurx -
Shrey
@gfx_shrey -
Mohamed Mater🇵🇸
@micro0x00 -
golu_369
@golu_369 -
mizzle
@MizzleMi -
Sirat Sami (analyz3r)
@siratsami71 -
elSec
@adrielsec -
sean
@seanyeoh -
sw33tLie
@sw33tLie -
N$
@nav1n0x -
clearbluejar
@clearbluejar -
Ninad Mishra
@NinadMishra5 -
Rémi GASCOU (Podalirius)
@podalirius_ -
Nick Powers
@zyn3rgy -
S3cur3Th1sSh1t
@ShitSecure
Something went wrong.
Something went wrong.