terjanqWAF bypasses via 0daysbased on findings from a live hacking event4 min read·Sep 23, 2022--1--1
terjanqHow to solve an XSS challenge from Intigriti in under 60 minutesWriteup to Intigriti’s 0621 XSS challenge8 min read·Jun 27, 2021--2--2
terjanqBlind SQL Injection without an “in”Alternative ways to retrieve table names in MySQL — without information_schema.5 min read·Jan 7, 2020----
terjanqClobbering the clobbered vol. 2Write-up based on “simple” XSS challenge by @terjanq3 min read·Dec 27, 2019----
terjanqMassive XS-Search over multiple Google productsA couple of months back, I took a part in researching dangers that come from Cache Probing Attack and new ways to exploit the…2 min read·Nov 12, 2019----
terjanqClobbering the clobbered — Advanced DOM ClobberingBased on @SecurityMB XSS Challenge·9 min read·Sep 26, 2019--3--3
terjanqXSS-Auditor — the protector of unprotectedand the deceiver of protected.4 min read·Apr 25, 2019--2--2
terjanqHow I am able to hijack you.or rather: How I am able to hijack your autosuggestions in Google Search.3 min read·Apr 3, 2019--1--1
terjanqinInfoSec Write-upsGoogle Books X-HackingCross-Site Search on Google Books by abusing the XSS Auditor4 min read·Mar 21, 2019--2--2