Sim4n6 @ Security Bug Focus π
@sim4n6.bsky.social
π€ 113
π₯ 165
π 138
A bug squasherποΈin spirit π ππππ₯
https://github.com/sim4n6/sim4n6
It started with: "When making a request using (Node.js) HTTP get with the path set to '/cafΓ©πΆ', the server receives /cafΓ©=6" Ended with: SSRF via Request Splitting, impressive and scary at the same time, indeed.
www.rfk.id.au/blog/entry/s...
19 days ago
0
0
0
is
#curl
still being developed? Well, that's wrap-up the matter, interesting insights on the matter from uncle curl himself... I still though have the same question π but from the financial perspective?
daniel.haxx.se/blog/2025/11...
loading . . .
Yes really, curl is still developed
A lot! One of the most common reactions or questions I get about curl when I show up at conferences somewhere and do presentations: -- is curl still being actively developed? How many more protocols c...
https://daniel.haxx.se/blog/2025/11/04/yes-really-curl-is-still-developed/
20 days ago
0
0
0
The path to venv is the sourcebut it's not sanitized properly and injected π into the activate script leading to is command injection.
add a skeleton here at some point
24 days ago
0
0
0
reposted by
Sim4n6 @ Security Bug Focus π
I guess 02 vulnerabilities: when resolving the symlink, attacker can switch it after the resolving (race condition, aftertime Check). Have you thought about nested symlinks, I love β₯οΈ this one. Very scarce. Realpath would resolve the symlink once. How About if the destination is another symlink
27 days ago
2
0
1
`CTRL+SHIFT+T` on Firefox is the best keyboard shortcut ever. It can instantly reopen the last closed tab. Amazing, Special thanks fly to the @firefox member of team who did that.
28 days ago
0
0
0
Oncle curl got a gold medal ππ
daniel.haxx.se/blog/2025/1...
loading . . .
A royal gold medal
The Royal Swedish Academy of Sciences (IVA, the same org that selects winners for three of the Nobel prize categories) awards me a gold medal 2025 for my work on curl. This academy, established 1919 by the Swedish king Gustav V, has been awarding great achievers for over one hundred years and the simple idea β¦ Continue reading A royal gold medal β
https://daniel.haxx.se/blog/2025/10/21/a-royal-gold-medal/
about 1 month ago
0
0
0
If the server-side relies on the browser's incoming Content-Type as a
#CSRF
protection, you can omit the CT entirely using a Blob object as a fetch() body to perform the state-changing operation, and if
#CORS
is permitted, leak the unleakable.
nastystereo.com/security/cr...
#BugBounty
about 1 month ago
0
0
0
reposted by
Sim4n6 @ Security Bug Focus π
does not that make you vulnerable to RCE somehow from clipboard value as a source of injection to shell pwn ? L13 :
gist.github.com/honoki/c4ec0...
11 months ago
1
0
1
TBH @zapier is really very practical and awesome ...
#KeepUpWithGreatWork
about 1 month ago
0
0
0
Mama Mia... When the hacking stars β β¨ do align... The results are amazing API hacking full pros access
samcurry.net/hacking-club...
loading . . .
Hacking the World Poker Tour: Inside ClubWPT Goldβs Back Office
In June, 2025, Shubs Shah and I discovered a vulnerability in the online poker website ClubWPT Gold which would have allowed an attacker to fully access the core back office application that is used f...
https://samcurry.net/hacking-clubwpt-gold?utm_campaign=APISecurity%20newsletter&utm_medium=email&_hsenc=p2ANqtz-89WWojYFJsXLBXKGrylaIV5ks_IdZwJ6EZGUDIVSBA8aHOZMUIXBGZF3AfQahBZMt_UEKaQvC9ihrIadOSQcDYgVdG6w&_hsmi=385494149&utm_content=385494149&utm_source=hs_email
about 1 month ago
0
0
0
AI generat e self contained docker compose files are mind blowing π
about 2 months ago
0
0
0
AI can't do that
jineeshak.github.io/posts/Chaini...
loading . . .
How I Chained Directory Traversal and CSV Parser Abuse for RCE in a Django App
While testing a web application as part of a bug bounty program, I uncovered a critical RCE vulnerability by chaining directory traversal with a subtle CSV parsing abuse. The exploit chain involved a ...
https://jineeshak.github.io/posts/Chaining-Directory-Traversal-and-CSV-Parser-Abuse-for-RCE-in-Django/
3 months ago
0
0
0
Arbitrary File overwrite... Interesting one
add a skeleton here at some point
4 months ago
0
1
0
A code review approach and two bypasses or more
add a skeleton here at some point
4 months ago
0
0
0
reposted by
Sim4n6 @ Security Bug Focus π
CaidoIO
4 months ago
We are super excited to share that we acquired the Shift Plugin (
shiftplugin.com
) and we are making it free to Caido paid users π Shift is a smart AI companion for your hacking. It can craft payloads, Match&Replace rules, HTTPQL queries, etc. All details here:
caido.io/blog/2025-07...
0
5
2
Scary beast .. !
add a skeleton here at some point
4 months ago
0
0
0
300$ for a Jira full read SSRF... What a waste of time and skill!
#BugBounty
bugcrowd.com/disclosures/...
loading . . .
Bypass of Wildcard Allowlist which leads to Full SSRF - CrowdStream - Bugcrowd
Bugcrowd's bug bounty and vulnerability disclosure platform connects the global security researcher community with your business. Crowdsourced security testing, a better approach! Run your bug bounty ...
https://bugcrowd.com/disclosures/8ceda9d9-7f87-4621-84f8-76b9262bbd96/bypass-of-wildcard-allowlist-which-leads-to-full-ssrf
4 months ago
0
0
0
To level up my
#BugBounty
game I use
#Scribe
, it Ai generates a steps to follow screenshots basedd on a recording
www.scribehow.com/lp/home?via=a
5 months ago
0
0
0
Amazing πΊ
add a skeleton here at some point
5 months ago
0
0
0
reposted by
Sim4n6 @ Security Bug Focus π
SonarResearch
6 months ago
SQL Injection despite using prepared statements? π§ Turns out that SQL syntax can be ambiguous! Learn how this has led to vulnerabilities in several popular PostgreSQL client libraries:
www.sonarsource.com/blog/double-...
#appsec
#security
#vulnerability
loading . . .
Double Dash, Double Trouble: A Subtle SQL Injection Flaw
Can a simple dash character introduce a security risk? Discover how SQL line comments can open the door to unexpected injection vulnerabilities in several PostgreSQL client libraries!
https://www.sonarsource.com/blog/double-dash-double-trouble-a-subtle-sql-injection-flaw/?utm_medium=social&utm_source=bluesky&utm_campaign=research&utm_content=blog-double-dash-double-trouble-250610-1&utm_term=---all&s_category=Organic&s_source=Social%20Media&s_origin=social
0
7
3
A nice and a sunny day π
6 months ago
1
0
0
"Please provide your professional email address to subscribe" ... sure , @wearehackerone.com follow me for more free bypasses π
6 months ago
0
0
0
reposted by
Sim4n6 @ Security Bug Focus π
Nicolas GrΓ©goire
7 months ago
TIL it's possible to search among opened Firefox tabs by prefixing your search with "%" π€― As a keyboard maximalist, the workflow should be "Ctrl-T + %search criteria + up/down + Enter" π¦₯
support.mozilla.org/en-US/kb/add...
loading . . .
Address bar autocomplete suggestions in Firefox | Firefox Help
When you type into the address bar, Firefox suggests pages you've bookmarked, tagged, visited before or have open in tabs. Learn more.
https://support.mozilla.org/en-US/kb/address-bar-autocomplete-firefox#w_changing-results-on-the-fly
1
21
3
Impressive what we can quickly fire with AI
7 months ago
0
0
0
I have great respect for the unknown and occasional vulnerability researcher who emerges from time to time with a killer discovery...
7 months ago
0
0
0
@saur1n.bsky.social
hey love the ssrf vuln outputs... Is there something more behind the scene...
7 months ago
1
1
0
reposted by
Sim4n6 @ Security Bug Focus π
manuel valdez
7 months ago
I'm starting a new series called: Weird SSRF outputs
1
2
1
#curl
is a precision weapon, love it β₯οΈ
7 months ago
0
0
0
Why CTRL+F for web page text searching in
#Mozilla
Firefox browser does not support an enable/disable regex support ?! or am I a freak for asking ?
7 months ago
0
0
0
/proc/self/cwd/ is a symlink pointing to the current working directory of the process that is accessing it ... Never lose sight of the process's CWD and what underneath again π«‘
7 months ago
0
0
0
A simplified guide to vulnerability disclosure through GitHub for Open Source maintainers
github.blog/security/vul...
Personal opinion: comparing a software vulnerability to a once home faulty lock is a very smart move.
loading . . .
A maintainer's guide to vulnerability disclosure: GitHub tools to make it simple
A step-by-step guide for open source maintainers on how to handle vulnerability reports confidently from the start.
https://github.blog/security/vulnerability-research/a-maintainers-guide-to-vulnerability-disclosure-github-tools-to-make-it-simple/
7 months ago
0
0
0
I hate this unilateral company emailing approach! In sum, you have the right to send me a message and I can't do the same, And reply, WTH? βπΌ Hello@ rocks π₯
7 months ago
0
0
0
add a skeleton here at some point
8 months ago
0
0
0
reposted by
Sim4n6 @ Security Bug Focus π
0xacb
8 months ago
Here's a challenge. There are at least two valid solutions! Solve it to discover a nice bug bounty tip! Play here π
https://challenges.ethiack.ninja/leak-the-secret/
3
8
2
reposted by
Sim4n6 @ Security Bug Focus π
Jorian
8 months ago
While listening to the
@ctbbpodcast.bsky.social
, I discovered that my own blog was vulnerable to Cache Deception! It would have allowed anyone to send me a link and then retrieve all hidden posts. This sent me down a caching deep dive, check out the details here:
jorianwoltjer.com/blog/p/codin...
loading . . .
Cache Deception on my new site! | Jorian Woltjer
A fun story about discovering my site was vulnerable to Cache Deception, allowing the visit of a link by me to leak all hidden blog posts to an attacker, thanks to URL-decoding and Path Traversals to ...
https://jorianwoltjer.com/blog/p/coding/cache-deception-on-my-new-site
1
9
1
You were supposed to destroy them, you were the chosen one !
8 months ago
0
0
0
Raining crits ... not even the season ...
8 months ago
0
0
0
"it's practically impossible to have a human-friendly text-based language, and at the same time be able to avoid giving attackers the ability to modify the control channel's content"
loading . . .
https://hackarcana.com/article/why-do-we-even-have-xss-sqli-etc
8 months ago
0
0
0
To my little understanding, a vulnerability is kind of road that shouldn't be taken in a certain way, but for some specific input it sneak down into and may cause unintended shenanigans. Right ? So why this is not a vulnerability ?
github.com/pypa/pip/iss...
loading . . .
Arbitrary Configuration Injection from a CLI input in pypa/pip Β· Issue #12382 Β· pypa/pip
Description An arbitrary configuration injection happens when the application in an unsanitized way considers the user input and can reach the configuration file. Under those circumstances, a malic...
https://github.com/pypa/pip/issues/12382
8 months ago
0
0
0
Similar True stories coming...
add a skeleton here at some point
8 months ago
0
0
0
Never tought about such an amount of issues
add a skeleton here at some point
8 months ago
0
1
0
@jameskettle.com
hey I have this question and I always had it, a bit avoiding to ask. You seem to figure out brand new ways to exploit and hack websites. And then you publish wonderful research. what I am missing is how do you monetize all this ? hw d u bring food to the table?
8 months ago
1
0
0
Hurry and kill. The waiting to. Celebrate π ego. I. Me
9 months ago
0
0
0
reposted by
Sim4n6 @ Security Bug Focus π
Ethiack
10 months ago
www.hackerone.com/blog/welcome...
loading . . .
Welcome, Hackbots: How AI Is Shaping the Future of Vulnerability Discovery
What are Hackbots and how are they impacting vulnerability discovery and the researcher community?
https://www.hackerone.com/blog/welcome-hackbots-how-ai-shaping-future-vulnerability-discovery
0
2
4
Honeypot π―
add a skeleton here at some point
10 months ago
0
0
0
reposted by
Sim4n6 @ Security Bug Focus π
Max Hils
11 months ago
mitmproxy 11.1 is out! π₯³ We now support *Local Capture Mode* on Windows, macOS, and - new - Linux! This allows users to intercept local applications even if they don't have proxy settings. More details are at
mitmproxy.org/posts/local-...
. Super proud of this team effort. π
loading . . .
Intercepting Linux Applications
https://mitmproxy.org/posts/local-capture/linux/
2
75
25
We are f*cked
#BugBounty
add a skeleton here at some point
11 months ago
0
0
0
@boredabdel.bsky.social
master, can you give us advices regarding the pace and speed of running
11 months ago
1
1
0
Beautiful π
add a skeleton here at some point
11 months ago
0
1
0
True story !
add a skeleton here at some point
11 months ago
0
0
0
Load more
feeds!
log in