ndevtk Profile Banner
NDevTK Profile
NDevTK

@ndevtk

Followers
965
Following
745
Statuses
268

Still pretending to be a security researcher.

Joined September 2021
Don't wanna be here? Send us removal request.
@ndevtk
NDevTK
2 months
I asked LLM to make a chromium security wiki based of the codebase :) its still learning.
1
1
12
@ndevtk
NDevTK
2 months
@JayateerthaG Need to find someway of automating it currently I have to keep talking to the LLM :)
0
0
1
@ndevtk
NDevTK
2 months
@JayateerthaG I'm bad at web design you can improve the style at otherwise I will brute force it with lots of theme options.
0
0
0
@ndevtk
NDevTK
2 months
@rebane2001 For a same-origin element doesn't seem that bad the crashing does make it a very visible attack.
1
0
0
@ndevtk
NDevTK
2 months
Bug write-up for "Google XSS part 2" :)
0
25
109
@ndevtk
NDevTK
3 months
Firefox version:
0
1
5
@ndevtk
NDevTK
3 months
@joaxcar Thanks please do provide feedback in reviews or hopefully will be on Firefox store soon :)
0
0
0
@ndevtk
NDevTK
3 months
@joaxcar Good idea I should compare it against the alternatives to make sure it's existence is justified don't want a generic extension.
1
0
0
@ndevtk
NDevTK
4 months
This post along with the link on that profile acts as confirmation of ownership for
0
0
3
@ndevtk
NDevTK
4 months
@jduck I did look seems there's at least a check for CATEGORY_BROWSABLE not sure if its to the same filtering standard as chromium does but harder to test, may need to publish a google play app.
1
0
0
@ndevtk
NDevTK
4 months
@rebane2001 I think the problem with this is that the copyright is for 2009 and in 2012 Google would at least use 2011 as the year.
0
0
1
@ndevtk
NDevTK
4 months
@ma1 @noscript In the Chrome settings under "Site Settings" there's an option to control what sites can run JavaScript sadly not going to have all the features of NoScript but it's a start.
0
0
0
@ndevtk
NDevTK
4 months
Bug write-up for "Miscellaneous" its got all the boring stuff like XSS on gstatic, my failed attempt with AI and Google open redirects. Although one did get $100 🦆
0
18
75
@ndevtk
NDevTK
4 months
@rebane2001 @cocoh_23 It would have been fun to have an ID leak included even if "just" a random file in the users drive :/
0
0
0
@ndevtk
NDevTK
4 months
@cocoh_23 Depends on the threat model its not an XS-Leak since its same-site if you assume a compromised renderer then its easy to abuse :) Cant test without a paid for GitHub service.
0
0
0
@ndevtk
NDevTK
4 months
@cocoh_23 Seems you're trying to get *.pages.github.io site isolated. For the invite step maybe could be a login xsrf otherwise there's a bit of social engineering.
1
0
0
@ndevtk
NDevTK
5 months
Some changes to the writeups page duck.css now has a lot more ducks used to just be the cursor which especially for mobile users was very misleading. 🦆 typoifier.css will no longer add typos to urls, email addresses or reward amounts to improve usability.
0
0
4