Advertisement Β· 728 Γ— 90

Posts by maitai

Here is the blog post about the Node.js permission escape: blig.one/2026/03/29/n...

I would like to highlight once again that this is not considered a vulnerability per the Node.js threat model.

The fix is now public on the Node.js repo

3 weeks ago 2 1 0 0
Preview
Decoding RFID: A comprehensive overview of security, attacks, and the latest innovations WHY2025 RFID reverse engineering has seen significant advancements, yet a comprehensive overview of the field remains scattered across research and practitioner communities. Here the authors presents a struc...

πŸ”₯ The future of RFID hacking isn’t dead, its even more...

At #WHY2025, Kirils and I are breaking down current RFID hacking situation

No fluff. Just spilling the beans.

πŸ—“οΈ 9th of August 13:00 at Andromeda
πŸ”— cfp.why2025.org/why2025/talk...

RT if you’re ready.

9 months ago 6 7 0 0
Post image Post image Post image Post image

ζœˆη«γ§ε²‘ε±±ζ—…θ‘Œγ«θ‘Œγ£γ¦γ„γŸ θ²·γ£γ¦γγŸγγ³γ γ‚“γ”γŒγŠγ„γ—γ„

1 year ago 2 1 0 1

Took me a while, but here is the full article!

If you want to see some weird URL parsing behavior, here you can find a lot of them :)

sec.leonardini.dev/blog/playing...

Disclaimer: no exploits nor vulnerabilities in this post, just some broken code

1 year ago 8 2 1 0

This article on Solr and its (in)security is really good πŸ’Ž

And I strongly recommend to read @hacefresko.com previous article on Solr before diving in this one (I will share the link in my reply)

1 year ago 14 4 2 0
Preview
WezTerm - Wez's Terminal Emulator Wez's Terminal Emulator

@suidpit.bsky.social wezterm.org

1 year ago 1 0 0 0

For this challenge, it was necessary to abuse a discrepancy between the DOM and the rendered page in Firefox's cache handling πŸ’½

πŸ‘‰ bugzilla.mozilla.org/show_bug.cgi...

This allows to shift iframe rendering from one to another leading to a sandbox bypass πŸ”₯

πŸ‘‰ mizu.re/post/an-18-y...

1 year ago 9 1 0 0
Advertisement
Post image

@hextreeio.bsky.social πŸ‘€

1 year ago 0 0 0 0
Post image

Bro is writing malware but also a Mad Max supervillian

1 year ago 41 5 1 1

AMD published Security Bulletin AMD-SB-7027 addressing CVE-2024-0179 and CVE-2024-21925, the two UEFI SMM vulnerabilities disclosed in our blog post.
Data center, desktop, mobile and embedded processors products are affected:
www.amd.com/en/resources...

1 year ago 2 2 0 0
Preview
Gaining kernel code execution on an MTE-enabled Pixel 8 In this post, I’ll look at CVE-2023-6241, a vulnerability in the Arm Mali GPU that allows a malicious app to gain arbitrary kernel code execution and root on an Android phone. I’ll show how this vulne...

Happy Friday folks! Here is a throwback to our 2nd most popular research post of 2024, "Gaining kernel code execution on an MTE-enabled Pixel 8" by Man yue Mo github.blog/security/vul...

1 year ago 3 2 0 0
a laptop running memtest86+, showing two errors. a wire pokes out from the lower edge of the laptop, annotated as "antenna wire". an orange cigarette/barbecue lighter sits next to it, annotated as "elite hacking tool"

a laptop running memtest86+, showing two errors. a wire pokes out from the lower edge of the laptop, annotated as "antenna wire". an orange cigarette/barbecue lighter sits next to it, annotated as "elite hacking tool"

Can you get root with only a cigarette lighter?

(Yes!)

www.da.vidbuchanan.co.uk/blog/dram-em...

1 year ago 397 81 15 11
Post image

I keep coming across all these "pseudocode" examples on Wikipedia and in academic papers, and what I don't understand is why the authors can't just learn a real programming language

1 year ago 78 7 13 1
Post image

Hype!

1 year ago 1 0 0 0
Flatt Security XSS Challenge - Writeup | maitai's blog

If you are interested in client-side hacking and browser quirks I strongly recommend going through this writeup by @maitai.bsky.social!
It was also cool to collab w/ him on the second chall πŸ€œπŸΏπŸ€›πŸ»
blig.one/2024/11/29/f...

1 year ago 13 7 0 0
Preview
Top 10 web hacking techniques of 2024 Welcome to the Top 10 Web Hacking Techniques of 2024, the 18th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year

The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2024! portswigger.net/research/top...

1 year ago 66 36 2 5
Advertisement