jinonehk Profile Banner
Jinone Profile
Jinone

@jinonehk

Followers
2K
Following
559
Media
13
Statuses
158

Security researcher

Joined May 2018
Don't wanna be here? Send us removal request.
@jinonehk
Jinone
5 days
Great experience collaborating with Akamai — the team is incredibly friendly and professional.
@ryancbarnett
Ryan Barnett (B0N3)
5 days
CVE-2025-66373: HTTP Request Smuggling Due to Invalid Chunked Body Size https://t.co/uviWpvUJBA
1
2
18
@jinonehk
Jinone
18 days
Great idea. I usually find fuzzing complete phone numbers quite complex. But this article inspires me to try guessing with a small dataset.
@j_zere
zere
19 days
Just released a blog post "Deanonymizing Users at Scale: When Blocking Becomes an Oracle". In it, I describe an attack that made it possible to reveal the phone number of almost any user on one of the world’s largest social platforms: https://t.co/CuTMMmm1X0
0
0
2
@Doyensec
Doyensec
1 year
🎉Announcing the latest research from our intern @maikypedia! In it, you'll learn all about Decompression Attacks, get to practice in custom-built labs and get some free @semgrep rules for detecting flaws. Check it out today! https://t.co/we46rcyptw #appsec #doyensec #semgrep
0
18
56
@jinonehk
Jinone
1 year
League of Legends is holding me back. I'm only ranked at diamond 2.
0
0
6
@H4R3L
Harel
2 years
New blog! This time a high severity session takeover in Zoom worth $15,000. Read the story of how @sudhanshur705 , @BrunoModificato and I chained 2 completely useless XSS vulns to steal OAuth tokens, hijack browser permissions, and more: https://t.co/qVUgk5shqh
nokline.github.io
Here you can read all about my research and techniques I’ve gathered over time!
10
132
431
@AethliosIK
Aethlios
2 years
Wow! Thanks for sharing my work @albinowax, it's really nice to see that it's reached your attention. :)
@albinowax
James Kettle
2 years
Just discovered "Reset Tolkien" , a shiny new tool from @AethliosIK for cracking time-based secret tokens with the sandwich attack. Random-looking tokens can contain so many flaws, it's great to see more eyes on this area. https://t.co/lFBwChkneU
0
1
21
@albinowax
James Kettle
2 years
I'm thrilled to announce "Listen to the whispers: web timing attacks that actually work" will premiere at Black Hat USA! After nine months of running bulk timing attacks on thousands of live sites, I've got a lot to share :D #BHUSA @BlackHatEvents https://t.co/YsrfM0SUm7
33
98
647
@CodeanIO
Codean
2 years
A public service announcement about #CVE-2024-4367 that we found in one of our pentests at Codean Labs. Make sure to update your #Firefox version to 126 and for #developers to update your PDF.js dependency. You can read our blog post for all details. https://t.co/4hJ0kSh87r
Tweet card summary image
linkedin.com
#CVE-2024-4367 that Thomas Rinsma found on PDF.js has been patched! We want to thank the awesome people at Mozilla for their fast and great collaboration in getting this fixed, y'all rock. Make sure...
0
14
39
@httpvoid0x2f
HTTPVoid
2 years
Enjoy our next blog post this time an SQL Injection on Apple’s Infra. Another win nets us a $25,000 bounty! 💻💰 #AppleSecurity #Research #bugbountytips #bugbounty https://t.co/p09IH8bE86
@pdiscoveryio
ProjectDiscovery
2 years
Check out our latest research blog, including detailed overview of how we discovered an SQL injection vulnerability (+ nuclei template) in Masa/Mura CMS and Hacked into Apple's Infrastructure. https://t.co/QfrbwaHaBc #AppleSecurity #Research #CyberSecuirty #BugBounty
0
35
185
@Creastery
Ngo Wei Lin
2 years
Check out my write-up on a seemingly harmless and limited send() in GitHub (CVE-2024-0200) and how it could be used to obtain environment variables from a production container and to achieve remote code execution in GitHub Enterprise Server: https://t.co/jmjTTOxEGY
Tweet card summary image
starlabs.sg
Earlier this year, in mid-January, you might have come across this security announcement by GitHub. In this article, I will unveil the shocking story of how I discovered CVE-2024-0200, a deceptively...
5
84
241
@jinonehk
Jinone
2 years
Hong Kong
0
0
2
@H4R3L
Harel
2 years
Just published a writeup on my account takeover vulnerability in ChatGPT, using a really cool web cache deception technique. Waited a while to finally publish this, enjoy :) https://t.co/P1vHoSzABX
nokline.github.io
Here you can read all about my research and techniques I’ve gathered over time!
27
208
712
@joaxcar
Johan Carlsson
2 years
Another great post on hoisting by @brutelogic! Missed this one when doing my own research. Interestingly the payload from my post work on the second example (undefined2.php) without hijacking atob %27-alert(1));function%20myObj(){}// https://t.co/c9z6NdvAXw
@BRuteLogic
Brute Logic
2 years
A good technique to deal with JSi based undefined scenarios. #XSS https://t.co/0OyXUr2EUm
2
5
38
@jinonehk
Jinone
2 years
Why is the highest severity of full-read ssrf with high impact only p2 on the @Bugcrowd platform? 😭
2
0
6
@ptswarm
PT SWARM
3 years
🧙‍♂️ CVE-2022-44268 - a vulnerability in ImageMagick that could lead to an arbitrary file read. How does it work? See here 👇
4
128
450
@yxw21
socket
3 years
New XSS platform released. Support using your own domain name. Support webhook. Mates with the burpsuite extension to log the full request that triggers xss. For more, please visit. https://t.co/WtUhwVFo0j #xsshunter #xss #hackerone #bugbounty #bugcrowd #bugbountytip #burpsuite
4
47
140
@PortSwiggerRes
PortSwigger Research
3 years
Arbitrary cache poisoning on all Akamai websites via 'Connection: Content-Length' - $50k in bounties well-earned by @jacopotediosi https://t.co/UmlKIGsgWR https://t.co/OFHGMVA2gP
Tweet card summary image
medium.com
Introduction And Context
7
136
463
@httpvoid0x2f
HTTPVoid
4 years
Hacking Google Drive integrations with a case study involving the use of CRLF and Request Pipelining to perform SSRF.
Tweet card summary image
github.com
Contribute to httpvoid/writeups development by creating an account on GitHub.
@disclosedh1
publiclyDisclosed
4 years
Dropbox disclosed a bug submitted by @rootxharsh: https://t.co/qiEbDW51a8 - Bounty: $17,576 #hackerone #bugbounty
3
186
490