@MrRunt1me Profile picture

MrRunt1me

@MrRunt1me

Joined September 2018
Similar User
eth10 photo

@etxxq

Olivier Beg photo

@smiegles

Michiel Prins photo

@michielprins

Vicky Chawla photo

@VickyChawla6

Paras Mehandiratta photo

@parasmehandirat

z3nitsu photo

@lovepreet_sg

lone ranger photo

@thecapitaan

MrRunt1me Reposted

Patch diffing CVE-2024-20696: Windows Libarchive RCE clearbluejar.github.io/posts/patch-tu… Credits @clearbluejar #windows #cybersecurity

Tweet Image 1

MrRunt1me Reposted

🧵Can you work out how to bypass this vulnerable CSRF protection? Read all about this gotcha in my latest blog post

Tweet Image 1

MrRunt1me Reposted

How we escalated a DOM XSS to a sophisticated 1-click Account Takeover for $8000 - Part 1 & Part 2 thefrogsec.github.io/2024/04/06/How… #infosec #bugbounty #TogetherWeHitHarder #inbbupdatesblogs


MrRunt1me Reposted

How I reverse-engineered an Android app, bypassed custom encryption layer, achieved server-side RCE, and earned a $5000 bounty. read the full story here (TLDR; but worth reading) blog.voorivex.team/from-an-androi…

Tweet Image 1

MrRunt1me Reposted

Rooting an Android POS "Smart Terminal" to steal credit card information:✅ Paper "Exploring and Exploiting an Android 'Smart POS' Payment Terminal", by Jacopo Jannone.Paying with a POS will never feel the same for me. PDF: nohat.it/slides/2024/ja… Video: youtu.be/a9BFGlxP71Y

Tweet Image 1
Tweet Image 2

MrRunt1me Reposted

last two weeks I was to able execute a lot of RCE in my box after analysis 38 template engines ! medium.com/@0xAwali/templ…


MrRunt1me Reposted

Learn how to conceal payloads in URL credentials and abuse them for DOM XSS and DOM Clobbering. portswigger.net/research/conce…


MrRunt1me Reposted

Absolutely stunning work from @pspaul95 on this CSS Injection - > text node exfil technique. blog.pspaul.de/posts/bench-pr…


MrRunt1me Reposted

Made a cheatsheet list with all my most posts that match up to @TJ_Null's list of HackTheBox machines that are helpful with various OffSec exams. Currently covers three versions of OSCP, OSEP, and OSWE. 0xdf.gitlab.io/cheatsheets/of…


MrRunt1me Reposted

Learn how to instrument Apple Vision Pro to extract liblockdown.dylib from the visionOS dyld shared cache and run it on macOS (M1) - 👉 Blog: romainthomas.fr/post/24-09-app… 🔗 GitHub: github.com/romainthomas/v… 🎥 Demo: m.youtube.com/watch?v=5L05OE… #QBDI #iOSSecurity


MrRunt1me Reposted

I've created cspbypass.com A site where you can search for known CSP bypass gadgets to gain XSS. Now it contains some example data but I'll try to update it with some usefull data over the next weeks. If you have some CSP bypasses to share, feel free to reach out!


MrRunt1me Reposted

Upgrade your SSRF, CORS & Open Redirect testing with our new URL Validation Bypass cheat sheet, containing all known techniques! portswigger.net/web-security/s…


MrRunt1me Reposted

Frans Rosen was on the pod last week and dropped some mind-bending X-Correlation Injection research on us. Including these gems on how to test for it... 1/7

Tweet Image 1

MrRunt1me Reposted

💌 Splitting the email atom: exploiting parsers to bypass access controls @garethheyes's @BlackHat talk on how discrepancies in email address parsers can lead to bypassing access controls & RCE Affected: GitHub, Zendesk, GitLab, Joomla 🛠️ Tools to find it: Hackvertor tags and…

Tweet Image 1

MrRunt1me Reposted

Explore all nine parts of our Advanced Frida Mobile Series at 8ksec.io/advanced-frida…. Learn about advanced topics such as memory manipulation, bypassing anti-debugging measures, and creating custom Frida scripts for targeted mobile security assessments. Part 1 - iOS Encryption…

Tweet Image 1

MrRunt1me Reposted

I found an old iOS reversing guide I wrote a few years ago, it's a bit dated but I think it's still useful ☺️ github.com/GhidraEnjoyr/i…


MrRunt1me Reposted

Windows Privileges for Fun and Profit redteamrecipe.com/windows-privil… from SeLoadDriver till SeBackupPrivilege... #redteam #privilegeescalation #windows #token

Tweet Image 1

United States Trends
Loading...

Something went wrong.


Something went wrong.