terjanq
@terjanq
Followers
11K
Following
2K
Media
139
Statuses
2K
security enthusiast that loves hunting for bugs in the wild. co-founder and player of @justCatTheFish. infosec at @google. opinions are mine.
Switzerland
Joined January 2019
We published a blogpost about SafeContentFrame - a library for rendering untrusted content inside an iframe. The library is a big party of what I've been up to in the few last years! Check out the blog and take a slice of my birthday cake π! https://t.co/9gGEqUuwIX
4
51
189
Shops were open this weekend, and we spent $4298 finishing π₯! Congrats to @fluxfingers for an amazing event.
0
8
23
The philosophy textbook "The Secret Codes of the Mind: Introduction to Philosophy" is the culmination of 40 years of academic and teaching excellence by Dr. Andrew V. Kudin. Spanning over 540,000 words, this monumental work has been thoughtfully divided into six volumes to ensure
0
2
10
Finished π₯ in https://t.co/AyuGCwzKsY CTF w/ @justCatTheFish Some cool challenges as always and with my teammates we managed to clear all web challenges yet again!
1
3
55
We have a really cool announcement: Weβre opening the Critical Research Lab to submissions! Our goal is to give hackers some incentive to write about the things theyβre studying, provide an extra reach for your work and give the community some incentive to share knowledge.
7
15
138
Governance is NEAR π³οΈ Voting on the first House of Stake sensing proposals is now live. You have 7 days to stake & delegate your veNEAR to make your voice heard. To participate in future binding votes, veNEAR will need to be staked & delegated PRIOR to a proposal going live.
25
72
497
XSS-Leak: Leaking Cross-Origin Redirects, Subdomains and More! You can read the article here: https://t.co/Zc6NWO4716
8
66
357
For the @ASIS_CTF, I created a challenge based on an interesting (novel?) DOM Clobbering technique! π© In short, in non-strict mode, HTMLCollection items are not writable. This blocks property assignment, allowing unexpected values to be created π π https://t.co/XiZX43MKY3
1
28
133
For the first time in my CTF career I saw such a shameless and broad flag sharing π¦ Almost all challenges dropped to minimal points with over 300 teams participating in the scheme! Only a few CTFs even get that number of all teams. That's just mind blowing π€―
10
9
195
Forcing Quirks Mode with PHP Warnings + CSS Exfiltration without Network Requests https://t.co/E2GkB7I5Mj Published author writeup for pure-leak in ASIS CTF Quals 2025!
3
73
311
Meanwhile, me who got hired in security with basically just a CTF background and who haven't learned about any of the mentioned things π
Stop wasting time on CTF challenges. Learn Docker security, EDR evasion, network segmentation, SAML/OAuth flows, WAF configuration, and how to debug production incidents. You'll be 10x more hireable than someone who rooted 500 vulnerable VMs.
9
14
315
Another challenge that I prepared for justCTF2025 was about a neat Prototype Pollution variation that bypasses commong mitigation strategies and which isn't commonly known, even in the infosec community! Checkout the writeup! https://t.co/plDN8KdlmE
2
37
204
For this year's justCTF2025 I created three web challenges. Here goes the writeup to Busy Traffic - the only unsolved challenge. It combined a neat technique of cache poisoning and response splitting to construct an arbitrary XSS. Check it out! https://t.co/TpqRVrFoGo
gist.github.com
Busy Traffic | justCTF 2025. GitHub Gist: instantly share code, notes, and snippets.
0
18
116
The 2025 edition of the CTF is over! Thanks everyone for playing. Congrats to the first three places: #1 @r3kapig + @ProjectSEKAIctf
#2 @Infobahn_ctf
#3 @kalmarunionenDM And also big thanks to our sponsors @trailofbits
@osec_io
@HexRaysSA
@zellic_io
3
13
56
https://t.co/Y0baddUzgJ yikes, Brave's HTML serialization seems really broken <div id=x><span x="aaa>&bbb"></div> <script> x.innerHTML=x.innerHTML; alert(x.innerHTML)// <span x="" aaa="">&bbb"></span> </script>
community.brave.app
Description of the issue: If you set HTML with attributes that contain escaped HTML code, when you get the HTML code the tags are unescaped. How can this issue be reproduced? If you use this:...
9
28
163
Less than 23 hours to go, and 3 challenges still unsolved! Check https://t.co/YfVp7gbiZ8 Shout-out to our sponsors! @trailofbits
@osec_io
@HexRaysSA
@zellic_io
0
7
17
So many unsolved web challenges this year π«£ The competition runs for another 28 hours!
4
8
93
π― JustCTF 2025 - 37h of top-tier online jeopardy CTF action! ποΈ Starts Aug 2, 0600 UTC π° $8,628 prize pool + IDA Pro licenses + swag Big thanks to our sponsors! @trailofbits @osec_io @HexRaysSA @zellic_io
https://t.co/YfVp7gaL9A | https://t.co/7N7YdKK9HP
#CTF #CyberSecurity
0
17
26