huli Profile
huli

@aszx87410

Followers
5K
Following
5K
Media
163
Statuses
3K

Taiwan / Front-end Engineer <=> Security Researcher. Interested in web. CTF player at @Water_Paddler

Joined January 2016
Don't wanna be here? Send us removal request.
@aszx87410
huli
2 years
🚀Exciting News! Introducing my latest work: Beyond XSS. This series of articles aims to introduce front-end security topics, perfect for frontend devs and those intrigued by frontend security. Suitable for all skill levels from beginners to intermediates.
Tweet card summary image
aszx87410.github.io
As a software engineer, you must be familiar with information security. In your work projects, you may have gone through security audits, including static code scanning, vulnerability scanning, or...
4
84
290
@aszx87410
huli
6 days
RT @kevin_mizu: I'm happy to release a script gadgets wiki inspired by the work of @slekies, @kkotowicz, and @sirdarckcat in their Black Ha….
0
154
0
@aszx87410
huli
6 days
RT @terjanq: For this year Google CTF I created yet another Postviewer challenge called Postviewer v5². The challenge featured a seemingly….
Tweet card summary image
gist.github.com
Postviewer v5 writeup - Google CTF 2025. GitHub Gist: instantly share code, notes, and snippets.
0
38
0
@aszx87410
huli
2 months
RT @J0R1AN: Double-Clickjacking, or "press buttons on other sites without preconditions". After seeing and experimenting with this techniqu….
Tweet card summary image
jorianwoltjer.com
Combing a lot of browser tricks to create a realistic Proof of Concept for the Double-Clickjacking attack. Moving a real popunder with your mouse cursor and triggering it right as you're trying to...
0
48
0
@aszx87410
huli
3 months
RT @slonser_: Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vuln….
0
178
0
@aszx87410
huli
4 months
RT @intenttoship: Blink: Intent to Deprecate and Remove: Remove auto-detection of ISO-2022-JP charset in HTML.
0
25
0
@aszx87410
huli
4 months
RT @rootxharsh: New Blogpost - We identified a vulnerability in Discourse where a misconfiguration in Rails send_file + Nginx's internal di….
0
36
0
@aszx87410
huli
4 months
RT @zhero___: while waiting for the big article to come (soon), I share with you a small article concerning a small research which led to a….
0
29
0
@aszx87410
huli
5 months
RT @osec_io: NEW: A few months ago, we uncovered an authentication bypass in Web3Auth that could have led to full account takeover. In thi….
0
36
0
@aszx87410
huli
5 months
RT @salvatoreabello: It's possible to do CSS exfiltration under default-src: 'self'. Learn how:
0
9
0
@aszx87410
huli
5 months
RT @J0R1AN: Here's a way to exploit `eval(name)` on Firefox without user interaction:
Tweet media one
0
15
0
@aszx87410
huli
5 months
RT @kevin_mizu: For this challenge, it was necessary to abuse a discrepancy between the DOM and the rendered page in Firefox's cache handli….
0
22
0
@aszx87410
huli
7 months
RT @BugsAggregator: Chrome Extension context isolation bypass. (reward: $10000)
0
7
0
@aszx87410
huli
8 months
RT @gregxsunday: Cross-Site POST Requests Without a Content-Type Header by @lukejahnke.#BBRENewsletter85 https://t.….
0
14
0
@aszx87410
huli
8 months
RT @icesfont2: x = open("/");.setTimeout(() => {.x.history.pushState(1,1,"/cookie");.setTimeout(() => {.x.location = "javascript:'zzz'";.se….
0
5
0
@aszx87410
huli
9 months
RT @kevin_mizu: My @HeroCTF #web challenges write-ups are now available! :D. Here's a short list of the topics cov….
0
32
0
@aszx87410
huli
10 months
RT @kinugawamasato: Here is a bypass fixed in DOMPurify 3.1.7. It works only if special settings are used. Notice why the comment is closed….
0
49
0
@aszx87410
huli
10 months
RT @ambionics: At long last: Iconv, set the charset to RCE (part 3): in this final part of the iconv series, @cfreal_ demonstrates how you….
Tweet card summary image
ambionics.io
In this blog post, we will explore how we can exploit CNEXT, but blind, covering the cases where we have a file read primitive, but cannot get the output.
0
55
0
@aszx87410
huli
10 months
finally finished my writeup(more like a note actually) for a few interesting web challenges in HITCON CTF & corCTF & sekaiCTF 2024. I didn't play all the challenges but still learn a lot from the writeup/solutions posted by others.
Tweet card summary image
blog.huli.tw
It’s been a while since I wrote writeup. I’ve wanted to write for a long time but kept procrastinating. For something like CTF writeups, speed is quite important because most discussions happen in Dis
1
30
117