slonser Profile
slonser

@slonser_

Followers
4K
Following
267
Media
38
Statuses
149

Co-Founder @neploxaudit. CTF team @C4TBuTS4D Security Researcher at Solidlab.

Joined December 2023
Don't wanna be here? Send us removal request.
@slonser_
slonser
11 months
In 2024, I interacted a lot with Extensions. I decided to create a resource that will help with a basic understanding of extensions and key attacks. P.S. I tried to make everything as clear as possible and hope it won’t feel too overwhelming anywhere. https://t.co/mnI255djn8
extensions.neplox.security
Welcome to our site dedicated to creating a comprehensive knowledge base on the security of Chromium extensions.
13
109
401
@slonser_
slonser
1 day
This matters because some characters have zero weight: they get ignored during search but remain after Unicode normalization. So if an app normalizes Unicode in its pipeline, a payload with an odd "a" won't pass - but a payload using zero-weight characters will.
0
0
11
@slonser_
slonser
1 day
Many of you have seen that article - the technique is awesome, but there's a small nuance. The idea that "MySQL casts the odd 'a' to normal 'a'" is a bit simplified: MySQL uses the Unicode Collation Algorithm and compares chars by weights.
@YShahinzadeh
YS
6 months
How did we (@AmirMSafari) earn $50k using the Punycode technique? I’ve published a detailed blog post about our recent talk, we included 3 attack scenarios, one of which poses a high risk of account takeover on any "Login with GitLab" implementation https://t.co/sUGsnJz2Fm
3
11
131
@slonser_
slonser
8 days
An amazing job! A wonderful compilation of most of the well-known techniques into a one-hour YouTube talk
@pspaul95
pspaul
8 days
My TROOPERS25 talk has been uploaded! If you ever wondered if "style-src: 'unsafe-line'" in your CSP is bad, this one is for you. Scriptless Attacks: Why CSS is My Favorite Programming Language https://t.co/Upx72xBzSf
0
9
43
@slonser_
slonser
16 days
I don't usually write about SQLi or similar findings, but this case was funny enough to share This technique also may be useful for bypassing WAFs (Cloudflare tested)
0
0
21
@slonser_
slonser
16 days
PostgreSQL parses this as follows: 1. $$0$$ - dollar-quoted string, auto-cast to integer 2. OR - logical operator 3. -0-$$0$$ - arithmetic expression 4. NOTNULL - null check (returns true) The tokenizer handles this without requiring spaces or traditional delimiters (comments)
1
0
17
@slonser_
slonser
16 days
I developed a bypass using PostgreSQL's dollar-quoting syntax: $$0$$OR-0-$$0$$NOTNULL This payload requires only two non-alphanumeric characters ($ and -) and evaluates to a valid boolean expression that returns all rows
1
3
35
@slonser_
slonser
16 days
Today I discovered an SQLi vulnerability in a PostgreSQL application where the injection point was path-based with strict length restriction (32 chars). Spaces, slashes, quotes, and parentheses e.t.c. resulted in a 400 Bad Request error and the path wasn't URL-decoded
2
30
261
@slonser_
slonser
26 days
Havent tweeted in a while. While my latest collab research with @J0R1AN is in review by the Chrome and Apple teams, I want to recommend my friend great research on @ton_blockchain drainers. Text version: https://t.co/AHvqQNcbb9 Video: https://t.co/xuD2JX1oGg
0
5
42
@slonser_
slonser
1 month
GReAT conference and super funny AD CTF I hope we'll take the top 1 next year too #TheSAS2025
0
0
81
@neploxaudit
Neplox
2 months
Neplox is coming to @BSidesNYC to talk about the #TON of #Crypto Drainers! 🎙️ ‟Down the Drain: Unpacking TON of Crypto Drainers” 🗓️ Oct 18, 10:00 EDT 📍 New York City, US Join us to learn about: • #Malware architecture • #DApp / #Wallet Impersonation • Exploited features
0
2
9
@ez_z3r
ezzer
3 months
Made a writeup on a critical CVSS 10.0 vulnerability I've recently found. Check it out, maybe you'll manage to make into a full config independent RCE. https://t.co/jQoTvtZ5Oe
2
25
112
@slonser_
slonser
3 months
Once again, big thanks to @immunefi - and personally to @0xTimofey - for the awesome organization! 💙
0
0
1
@slonser_
slonser
3 months
It pushes you to analyze code more systematically, picking up on even the smallest hints of potential threats. (Obviously, that makes little sense in a bug bounty context - but in audits, it's super valuable.)
1
0
1
@slonser_
slonser
3 months
This was a really great experience - huge thanks to @immunefi for it! This audit reminded me why I love doing audits in the first place: you can report informational, deep architectural issues that may cause problems down the road.
@neploxaudit
Neplox
3 months
Several of the audits we conducted this summer were done through @immunefi's Audits service. They went pretty smoothly thanks to Immunefi, and we'd like to break down a few notable points from one audit in particular 🧵
2
1
21
@slonser_
slonser
4 months
The plugin is free, so give it a try! I'm open to feature requests. 💡Bonus: Since Cursor supports local models, you can use the plugin with them - no data ever leaves your machine.
0
0
7
@slonser_
slonser
4 months
Sometimes a single query is enough to completely solve your problem. Stupid example: I opened PortSwigger lab task - and Claude + Ebka AI solved it, automatically creating a Finding with a full description.
1
0
1
@slonser_
slonser
4 months
When writing complex exploits, Cursor can now pull the info it needs directly from your Caido proxy. It can also work with: ✅ Match/Replace rules ✅ Scope & Findings ✅ Filters, HTTPQL ✅ 38 MCP tools in total Effectively, this gives your AI full access to your Caido instance.
1
0
1
@slonser_
slonser
4 months
🚀 Ebka AI is now available in the @CaidoIO Plugins Store The MCP integration is tested with Claude and Cursor. For open-source projects, you can now just ask your IDE: "Create Replay collections for each module and populate them with requests" https://t.co/QeybyJVtGM
2
7
55
@slonser_
slonser
4 months
Plugin is not in @CaidoIO store yet and don't have all functionality that i would like to implement. But you can test current version on github!
0
0
3
@slonser_
slonser
4 months
It's also important that with this tool you can simultaneously use other MCP programs as well (a simple example would be internet search)
1
0
3