Skip to content

Instantly share code, notes, and snippets.

View parrot409's full-sized avatar
🏴
Maybe doing CTF?

parrot409 parrot409

🏴
Maybe doing CTF?
View GitHub Profile

So safe website

I inspired this challenge while i was playing a challenge by @53c0nd-2473.

  1. Overwrite Object object's getOwnPropertyNames with "nice feature" to bypass dompurify + trusted types. {"name":{"__proto__":{"__proto__":{"constructor":{"getOwnPropertyNames":"B"}}}}}
  2. Bypass custom filter with noscript tag. example: <noscript><img src="</noscript><img src=1 onerror=alert()">
  3. Steal cookies with using debug.js and set parent's name to cookies and do redirect with meta tag
  4. Send window.name to your webhook.
@parrot409
parrot409 / ff
Created December 19, 2020 19:38
ff
alert();
@parrot409
parrot409 / redpwn2020_viper.py
Last active June 27, 2020 04:17
redpwn2020_viper
#!/usr/bin/env python3
#Written by 0xParrot
import requests
import uuid
import re
import base64
addr = "2020.redpwnc.tf:31291"
addrP = "http://2020.redpwnc.tf:31291"
@parrot409
parrot409 / redpwn2020_unintended_got_stacks.py
Last active June 27, 2020 04:16
My redpwn2020 solutions
#!/usr/bin/env python3
#Written by 0xParrot
#This is unintended solution.
import requests
import string
import base64
import random
import json
import time
flag = ""