FD

996 posts

FD

FD

@filedescriptor

@0xReconless

Hong Kong Katılım Şubat 2014
34 Takip Edilen16.5K Takipçiler
FD
FD@filedescriptor·
Google(Chromium) suddenly decided to pay me for a UI Spoofing bug reported 3 years that had been idle, and from reward potential to no potential to potential. Ok thanks?
FD tweet mediaFD tweet media
English
1
4
51
12K
FD retweetledi
7ASecurity
7ASecurity@7aSecurity·
This #privacy audit looks like the first LeaveHomeSafe #pentest ever, way below commercial apps: Broken SSL validation, SD Card Leaks, 2FA Logic bypass, Screenshot leaks, several Face Recognition artifacts, etc. 7asecurity.com/blog/2022/07/l…
Open Technology Fund@OpenTechFund

Serious vulnerabilities have been found in the Hong Kong government's LeaveHomeSafe COVID-19 app. @7aSecurity recently conducted a security audit that discovered numerous flaws that allow interception of the LeaveHomeSafe app and its backend servers. opentech.fund/news/7asecurit…

English
1
17
22
0
FD retweetledi
VXCON
VXCON@vxresearch·
We are organising VXCON on 27 August. Please feel free to submit CFP. vxcon.hk
English
0
2
3
0
FD retweetledi
TrendAI Zero Day Initiative
Confirmed! Masato Kinugawa demonstrated a 3-bug chain of injection, misconfiguration and sandbox escape on Microsoft Teams to earn $150K and 15 Master of Pwn points.
TrendAI Zero Day Initiative tweet media
English
1
25
130
0
FD retweetledi
Renwa
Renwa@RenwaX23·
New writing about the story of 3 bug bounty reports in which I chain low severity bugs together for higher impact and less known browser tricks. Includes CSS injection, Self-XSS, Drag-Drop XSS, Cookie Bomb, Login-Logout-CSRF, and more... @renwa/the-underrated-bugs-clickjacking-css-injection-drag-drop-xss-cookie-bomb-login-logout-csrf-84307a98fffa" target="_blank" rel="nofollow noopener">medium.com/@renwa/the-und…
English
4
102
311
0
FD retweetledi
Ed
Ed@EdOverflow·
After 5 years of work, security.txt is officially an RFC. I am pleased to announce RFC 9116: rfc-editor.org/rfc/rfc9116. I would like to use this opportunity to thank those who made this possible. Thank you. ❤️
Ed tweet media
English
43
956
2.7K
0
FD retweetledi
HACxyk.
HACxyk.@Hacxyk·
We found a way to spoof ENS domains and were awarded a $15k bug bounty by @ensdomains 👇Check out the write-up @hacxyk/how-we-spoofed-ens-domains-52acea2079f6" target="_blank" rel="nofollow noopener">medium.com/@hacxyk/how-we…
English
4
22
120
0
Intigriti
Intigriti@intigriti·
can we get an "f" in the chat for the hacker that just reported a crit 2 seconds after someone else did? 😔 #duped
Intigriti tweet media
English
47
22
311
0
Gareth Heyes \u2028
Gareth Heyes \u2028@garethheyes·
Apparently if you swear at JavaScript you still get an alert(1): #!@*%
alert(1)
Gareth Heyes \u2028 tweet media
English
6
79
373
0
FD
FD@filedescriptor·
Why do we need NFT on social media??
English
3
0
12
0
Luke Tucker
Luke Tucker@luketucker·
Last Friday was my last day at @Hacker0x01. The past 5-years have been the best of my career. I love H1: the mission, my colleagues, and of course the hacker community. Serving as head of community for several years was such a privilege. youtu.be/j_6_qO3SvvQ
YouTube video
YouTube
English
38
3
234
0
FD
FD@filedescriptor·
@freddyb typeof document.all != "function" && document.all(0)
English
0
0
1
0
FD
FD@filedescriptor·
@terjanq Thanks for the heads up it's back!
English
0
0
10
0
FD retweetledi
FD
FD@filedescriptor·
@garethheyes Also function solve(obj, property){ if(typeof obj != 'function') { obj(property).innerHTML = '<img src=1 onerror="alert(`You win`)">'; } else { alert('You must try harder than that.'); } }
English
1
5
17
0
Gareth Heyes \u2028
Gareth Heyes \u2028@garethheyes·
<script> function solve(obj, property){ if(typeof obj === 'undefined') { obj[property].innerHTML = '<img src=1 onerror="alert(`You win`)">'; } else { alert('You must try harder than that.'); } } </script> <div id=x></div> Can you solve it?
English
8
14
114
0