LogicalHunter Profile Banner
Borna Nematzadeh Profile
Borna Nematzadeh

@LogicalHunter

Followers
3K
Following
2K
Media
16
Statuses
237

Security Researcher

Joined November 2020
Don't wanna be here? Send us removal request.
@LogicalHunter
Borna Nematzadeh
1 year
I've published my new research, "Exploiting Number Parsers in JavaScript". In this article, I’ve discussed the number parsers in JavaScript and the different attack scenarios you might encounter. https://t.co/VMVqHF3j2q
Tweet card summary image
logicalhunter.me
Summary This research will explore the following topics: An overview of number parsers in JavaScript There are two general ways to parse numbers in JavaScript: using the Number Constructor and its...
6
21
122
@gvrp_writeups
Awesome Google VRP Writeups
5 months
New Google VRP writeup "XSS in Google IDX Workstation" for a bounty of $22,500 by @sudhanshur705: https://t.co/16Fz5H5f0R
Tweet card summary image
sudistark.github.io
Technical breakdown of an XSS vulnerability in Google IDX Workstation.
0
24
128
@j_domeracki
Jakub Domeracki
5 months
@GoogleVRP disclosed my most impactful client-side report to date: https://t.co/yGZJrSZEbe TL;DR An attacker could've gained access to Gemini Code Assist Tools (GitLab, GitHub etc.) configured by the victim
Tweet card summary image
bughunters.google.com
Found a security vulnerability? Discover our forms for reporting security issues to Google: for the standard VRP, Google Play, and Play Data Abuse.
3
33
130
@lean0x2f
Leandro Barragan
6 months
"AI Agents for Offsec with Zero False Positives" by @moyix, a journey on how we managed to get 0 FPs with XBOW. You can find the slides for his BH talk here: https://t.co/vFEfm5HkxT
1
57
248
@Steph3nSims
Stephen Sims
10 months
An Introduction to using Artificial Intelligence (AI) for Vulnerability Research
8
227
747
@GoogleVRP
Google VRP (Google Bug Hunters)
1 year
❌ Eliminating almost all exploitable web vulnerabilities? This blog post covers how the Google security team implemented a high-assurance web framework to achieve this goal for its services, and what this framework's most important characteristics are. https://t.co/dohOwvCOtz
Tweet card summary image
bughunters.google.com
Learn more about how Google has created and deployed a high-assurance web framework that almost completely eliminates exploitable web vulnerabilities.
4
45
176
@2ourc3
2OURC3
1 year
Write-up of my v8 bug: Critical type confusion in V8's Turboshaft compiler allowed stale pointers to bypass GC, leading to exploitable memory corruption. Full details + PoC:
Tweet card summary image
bushido-sec.com
V8 Turboshaft Load Elimination Type Confusion Vulnerability (CVE-2024-6773)Exploitable Memory Corruption via Garbage Collection Race Condition Executive Summary A critical type confusion vulnerabil...
2
60
243
@LogicalHunter
Borna Nematzadeh
1 year
It's an honor that my research, Exploiting Number Parsers in JS, has been nominated for the Top Ten Web Hacking Techniques of 2024. I discussed how discrepancies in JS number parsers could be used to carry out DoS attacks. If you find it interesting, please vote for it!
@albinowax
James Kettle
1 year
Voting is now live for the Top Ten (New) Web Hacking Techniques of 2024! Browse the nominations & cast your votes here:
3
4
52
@Sonar_Research
Sonar Research
1 year
🧵 [1/4] Here is our DOMPurify 3.2.1 bypass, using a namespace confusion technique where each element is initially in a “correct” namespace. When it was allowed, the ‘is’ attribute was not handled correctly, making the attribute content’s regex check obsolete. #mXSS #XSS
2
41
148
@cdzeno
cdzeno
1 year
Just discovered 10 memory corruption vulnerabilities in the popular Mongoose Web Server (11k stars on GitHub) by fuzzing its embedded TLS stack protocol with @aflplusplus. More technical details here: https://t.co/AzK6USwACO
0
44
222
@LogicalHunter
Borna Nematzadeh
1 year
There is no prize to perfection, only an end to pursuit
1
0
15
@ndevtk
NDevTK
1 year
Released a new extension :) - https://t.co/sphNJdvUyt for postMessages from all_frames. - detects the scope of sent messages. - origins that are insecure, will be prefixed with UNSAFE. - detects if a website does not check .origin - MessageChannel API https://t.co/56gtuIU7qw
Tweet card summary image
chromewebstore.google.com
Extension to log postMessage()
3
25
124
@LogicalHunter
Borna Nematzadeh
1 year
Awesome research!🔥
@kevin_mizu
Kévin GERVOT (Mizu)
1 year
I'm thrilled to finally share my research on HTML parsing and DOMPurify at @GreHack 2024 📜 The research article is available here: https://t.co/GIqy0hTCdR The slides are available here: https://t.co/97iiZgoJqb 1/3
1
0
13
@m4ll0k
m4ll0k
1 year
I created a small tool to automatically set breakpoints in Chrome using the CDP (Chrome DevTools Protocol). It’s still in beta, but I’m actively working on a complete version.. https://t.co/8Hn5XgAWs1
4
26
155
@MtnBer
Matan Berson
1 year
Here's a code snippet that as far as I can tell pretty much solves prototype pollution. It's based on https://t.co/VkshO7Wpyh, and after running it you can access an object's prototype with object[Symbol.instanceProto], and object["__proto__"] will be undefined.
4
4
86
@domenuk
dmnk.bsky.social
1 year
Project Zero blog: LLMs find 0days now! 👀 And: our fuzzer setup did *not* reproduce it! https://t.co/xz6j2fzrWe
9
150
608
@LogicalHunter
Borna Nematzadeh
1 year
I have updated the list of custom filters for Logger++. The new additions include: . New API Style (gRPC-Web) . Improved previous filters . Exposed API keys custom filters . New filters for API vulnerabilities https://t.co/XfoRQjvHmu
Tweet card summary image
github.com
A comprehensive list of custom filters for Logger++ to identify various vulnerabilities in different API styles - bnematzadeh/LoggerPlusPlus-API-Filters
3
8
68
@orange_8361
Orange Tsai 🍊
1 year
Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! https://t.co/YzYcwxOGBn Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code
37
650
2K
@a0xnirudh
Anirudh Anand
2 years
#TypeScript Remote Procedure Call (tRPC) Security Research: Hunting for Vulnerabilities in Modern APIs, a nice read from @LogicalHunter: https://t.co/ub4Yrb43rD Vulnerable tRPC playground: https://t.co/6Qv9qGqvdx
0
11
40
@PaulosYibelo
Paulos Yibelo
2 years
New blog alert! 🚨 Delve into an intriguing browser based web attack vector I stumbled upon that is widespread and can be used to perform ATO. I call it Cross Window Forgery. 🫧🌊🌪️🌀 https://t.co/0bXTyl2JVH
4
51
154