ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು & ಪ್ರತಿಕ್ರಿಯೆಗಳು
- ಮಾಧ್ಯಮ
@molnar_g ತಡೆಹಿಡಿಯಲಾಗಿದೆ
ನೀವು ಖಚಿತವಾಗಿಯೂ ಈ ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡಲು ಬಯಸುವಿರಾ? ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡುವುದು @molnar_g ಅವರನ್ನು ತಡೆತೆರವುಗೊಳಿಸುವುದಿಲ್ಲ.
-
That time I fled Communist Romania to a refugee camp in Austria, came to America, & years later became an exec
@Google creating 10ks of jobshttps://twitter.com/TrumpHotels/status/123822377875415040 … -
-
Very excited to announce U2F support on Facebook today! https://www.facebook.com/notes/facebook-security/security-key-for-safer-logins-with-a-touch/10154125089265766 …
-
Short blog post: Measuring web security mitigations http://sirdarckcat.blogspot.com/2017/01/measuring-web-security-mitigations.html …


-
Bypass IE XSS filter for POST requests with any POST payload (it is not triggered at all). Of course PDF is used: http://insert-script.blogspot.co.at/2017/01/complete-internet-explorer-xss-filter.html …
-
Check out my interview with
@Hacker0x01 about the@Burp_Suite bug bounty program: https://hackerone.com/blog/Chat-With-Burp-Suite-About-Their-Bug-Bounty-Story … -
Patrick Toomey ಗೆ ಪ್ರತ್ಯುತ್ತರವಾಗಿ
.
@patricktoomey Nice writeup. Can't wait to see what bypasses people come up with for the Github CSP bug bounty https://bounty.github.com/targets/csp.html … -
Wrote up a summary of some of the content security policy related work we have been up to on http://GitHub.com https://githubengineering.com/githubs-post-csp-journey/ …
-
Heads-up: WebAssembly will soon be enabled by default in
@Chrome Canary! On target for shipping to stable end of Q1! http://webassembly.org/roadmap pic.twitter.com/HeJVVxyd08
-
Posted four old browser bugs https://alf.nu/WebkitURLs and a new one https://alf.nu/SafariReaderUXSS …pic.twitter.com/izc4q9nkno
-
Added a few more CSP bypasses to the list. Happy to receive suggestions, ideas and PoCs. Just ping me. http://sebastian-lekies.de/csp/bypasses.php …
-
Finally MS killed UTF-7 in Edge? No, it's alive in text/xml :D text/html: http://vulnerabledoma.in/char_test?charset=utf-7&xss=0&body=%2BADw-script%2BAD4-alert%281%29%2BADw-/script%2BAD4%2D … text/xml: https://vulnerabledoma.in/char_test?charset=utf-7&xss=0&mime=text/xml&body=%2BADw-script%20xmlns=%22http://www.w3.org/1999/xhtml%22%2BAD4-alert%281%29%2BADw-/script%2BAD4%2D …
-
Is origin-checking now considered good enough as CSRF-defense or do we still need tokens? Can flash/applets etc. fake origin headers?
-
The full list of CSP bypasses with all known vectors that came up during the recent discussions: http://sebastian-lekies.de/csp/bypasses.php …
-
The people have spoken, here is our XSSMas hint about the jQuery thing: https://www.youtube.com/watch?v=uc2UEfWjvo8 … This is not a prank, it is an actual hint.
-
Blogged! XSS Auditor bypass using <param> http://masatokinugawa.l0.cm/2016/12/xss12.html … (日本語) http://mksben.l0.cm/2016/12/xssauditor-bypass-using-paramtag.html … (English)
-
Bypassing CSP script nonces via event handlers: http://sebastian-lekies.de/csp/attacker3.php …. The full list of bypasses is here: http://sebastian-lekies.de/csp/bypasses.php …
-
Gábor Molnár ಹಿಂಬಾಲಿಸಿದ್ದಾರೆ pagetable, Erling Ellingsen, img src and 4 others
-
Bypassing CSP script nonces via the browser cache: http://sebastian-lekies.de/csp/attacker.php …. Nonces are incompatible with most caching mechanisms.
#CSP -
Santa was arrested. Help him and solve...
The Cure53 XSSMas Challenge 2016! https://xssmas2016.cure53.de/
ಲೋಡಿಂಗ್ ಸಮಯ ಸ್ವಲ್ಪ ತೆಗೆದುಕೊಳ್ಳುತ್ತಿರುವಂತೆನಿಸುತ್ತದೆ.
Twitter ಸಾಮರ್ಥ್ಯ ಮೀರಿರಬಹುದು ಅಥವಾ ಕ್ಷಣಿಕವಾದ ತೊಂದರೆಯನ್ನು ಅನುಭವಿಸುತ್ತಿರಬಹುದು. ಮತ್ತೆ ಪ್ರಯತ್ನಿಸಿ ಅಥವಾ ಹೆಚ್ಚಿನ ಮಾಹಿತಿಗೆ Twitter ಸ್ಥಿತಿಗೆ ಭೇಟಿ ನೀಡಿ.
Laszlo Bock
Antonio Perić
hillbrad
Eduardo Vela
alex
James Kettle
Gábor Molnár
Patrick Toomey
Benedikt Meurer
Erling Ellingsen
Sebastian Lekies
Masato Kinugawa
Erlend Oftedal
Cure53