pspaul95 Profile Banner
pspaul Profile
pspaul

@pspaul95

Followers
966
Following
6K
Statuses
231

source code connoisseur @Sonar_Research | CTF @FluxFingers | @[email protected]

Germany
Joined March 2017
Don't wanna be here? Send us removal request.
@pspaul95
pspaul
3 days
@rebane2001 @Jane0ri Firefox doesn't seem to support animating custom properties (breaking the value caching) and also doesn't support container style queries yet
0
0
1
@pspaul95
pspaul
4 days
@rebane2001 I built HTML/CSS-only click/arrow-keys controls that control an infinite counter recently! I did it for Chrome but it should be doable for Firefox too I think 🤔 I can share it with you in a few hours when I'm back at my laptop
1
0
2
@pspaul95
pspaul
4 days
Wow, thanks for 2nd place! Didn't expect this, maybe it's my sign to finally write it down in text form and tackle all the follow-up ideas 👀
@PortSwiggerRes
PortSwigger Research
6 days
The results are in! We're proud to announce the Top ten web hacking techniques of 2024!
1
0
29
@pspaul95
pspaul
14 days
@bl4sty @OVHcloud I think I had something similar happen on AWS where their cloud-init script would generate new keys during boot if certain markers changed (like the instance ID). Sounds like OVH's "migration" might have caused something like that, maybe you can find some related logs
1
0
1
@pspaul95
pspaul
19 days
@Blaklis_ thank you!
0
0
0
@pspaul95
pspaul
19 days
💉 SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level Video: Slides:
0
0
1
@pspaul95
pspaul
1 month
RT @Sonar_Research: What a year! We look back and summarize our security research highlights of 2024: 🪲 Vulnerabilities in Jenkins, Source…
0
12
0
@pspaul95
pspaul
1 month
RT @albinowax: Nominations are now open for the Top 10 Web Hacking Techniques of 2024! Browse the contestants and submit your own here: htt…
0
89
0
@pspaul95
pspaul
2 months
RT @YNizry: 🧬🔬 I wrote about this finding a bit more extensively in my blog: #mXSS #XSS
0
23
0
@pspaul95
pspaul
2 months
RT @lukejahnke: 🧵Can you work out how to bypass this vulnerable CSRF protection? Read all about this gotcha in my latest blog post https://…
0
66
0
@pspaul95
pspaul
3 months
RT @flatt_sec_en: 🚨 Try your hand at our latest XSS Challenge! 🚨 Can you get alert(origin) executed in each problem? This challenge featu…
0
31
0
@pspaul95
pspaul
3 months
RT @Sonar_Research: In case you missed it, here's the recording of our #HEXACON2024 talk "Exploiting File Writes in Hardened Environments"!…
0
15
0
@pspaul95
pspaul
3 months
@mistymntncop thanks! :)
0
0
0
@pspaul95
pspaul
4 months
I'm quite proud of the challenges I wrote for this year, especially GymTok, Bench Press, and Ancient Monkey! I was very hooked by the research that went into them, so make sure to give them a look 👀
@fluxfingers
FluxFingers
4 months
Hacklu CTF is still running for ~23h! We still have some unsolved challenges, including: - 📱Android Flutter exploitation - 🦊 2 webs with Firefox bots - 🐒 pwning a 17 year old SpiderMonkey - ✍️ LaTeX madness Come play: 
1
1
13
@pspaul95
pspaul
4 months
Crazy good research from @scryh_ again! Turning a file write in any Node.js application into RCE 🔥
@Sonar_Research
Sonar Research
4 months
From HTTP request to ROP chain in Node.js! 🔥 Our latest blog post explains how to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only:
Tweet media one
0
1
14
@pspaul95
pspaul
4 months
@Agarri_FR @Sonar_Research Thanks, glad you liked it! 🙏
1
0
1