@kinugawamasato is blocked

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @kinugawamasato.

  1. no UI vector, inspired by vector :D <div style=writing-mode:tb;overflow:scroll onscroll=alert(1)>

  2. No UI vector Edge, MSIE10-11 <div style="-ms-scroll-limit:1px;overflow:scroll;width:1px" onscroll=alert('xss')>

  3. All passive element XSS on IE are: I was surprised that width/height property brings focus event. cc

  4. XSS inside an editable area and can't use contenteditable=false? <a style="-webkit-user-modify: read-only;" href="javascript:alert(1)">CLICK

  5. Interesting mutation via createElement('isindex') and ('image')

  6. 同様のメッセージが出るCVリストに載ったドメインでもデフォルトで自動的にIEを起動する動作に変更なら、CVリストのドメインのXSSを使って、IE固有のExploitをEdgeからいきなり展開できるようになりそうだ。

  7. MSIE Meets WebAssembly! I just wrote WASM × JS polyglot :)

  8. "Calling alert from WebAssembly (WASM)" - a very simple tutorial to show that WASM isn't as hard as it looks

  9. Blogged! / XSS Auditor bypass using Flash and base tag (日本語) (English)

  10. CFP応募開始です。/ 講演者募集 || CALL FOR PAPERS || 世界トップクラスの専門家による情報セキュリティ国際会議「CODE BLUE(コードブルー)」

  11. H5SC Mini-Challenge "XSS Metaphor" 5 - The Write-Up

  12. OTF+SVG allows to read info character by character with only a STYLE injection through XEE & timing

  13. New challenge "The XSS Metaphor" by & me is out. Have a great and productive week :)

  14. 情報処理~~試験のXSSスペシャリストでCSPバイパス出たってマジか・・・(適当)

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·