WAF bypasses via 0daysbased on findings from a live hacking eventSep 23, 2022A response icon1Sep 23, 2022A response icon1
How to solve an XSS challenge from Intigriti in under 60 minutesWriteup to Intigriti’s 0621 XSS challengeJun 27, 2021A response icon2Jun 27, 2021A response icon2
Arbitrary Parentheses-less XSSagainst strict CSP policiesAug 9, 2020A response icon2Aug 9, 2020A response icon2
Blind SQL Injection without an “in”Alternative ways to retrieve table names in MySQL — without information_schema.Jan 7, 2020Jan 7, 2020
Clobbering the clobbered vol. 2Write-up based on “simple” XSS challenge by @terjanqDec 27, 2019Dec 27, 2019
Massive XS-Search over multiple Google productsA couple of months back, I took a part in researching dangers that come from Cache Probing Attack and new ways to exploit the…Nov 12, 2019Nov 12, 2019
Clobbering the clobbered — Advanced DOM ClobberingBased on @SecurityMB XSS ChallengeSep 26, 2019A response icon3Sep 26, 2019A response icon3
XSS-Auditor — the protector of unprotectedand the deceiver of protected.Apr 25, 2019A response icon2Apr 25, 2019A response icon2
How I am able to hijack you.or rather: How I am able to hijack your autosuggestions in Google Search.Apr 3, 2019A response icon1Apr 3, 2019A response icon1
Published inInfoSec Write-upsGoogle Books X-HackingCross-Site Search on Google Books by abusing the XSS AuditorMar 21, 2019A response icon2Mar 21, 2019A response icon2