Kévin Gervot (Mizu)'s Avatar

Kévin Gervot (Mizu)

@mizu.re

About me? | Website: https://mizu.re | Tool: https://github.com/kevin-mizu/domloggerpp | Teams: @rhackgondins, @FlatNetworkOrg, @ECSC_TeamFrance | From: https://twitter.com/kevin_mizu

1,112
Followers
118
Following
28
Posts
21.11.2024
Joined
Posts Following

Latest posts by Kévin Gervot (Mizu) @mizu.re

Post image

A quick update has been made to DOMLogger++ to add / update a few things. It's not a big deal, but it should allow interesting stuff to be done :)

It should be available on the stores in the coming hours.

24.10.2025 13:59 👍 0 🔁 0 💬 0 📌 0
Preview
Exploiting Web Worker XSS with Blobs Ways to turn XSS in a Web Worker into full XSS, covering known tricks and a new generic exploit using Blob URLs with the Drag and Drop API

My first post for the @ctbbpodcast.bsky.social Research Lab is live.
Super excited to be part of this team, can't wait to see what crazy research is gonna come from this!
lab.ctbb.show/research/Exp...

19.09.2025 14:28 👍 9 🔁 3 💬 0 📌 0
Post image

For the @ASIS_CTF, I created a challenge based on an interesting (novel?) DOM Clobbering technique! 🚩

In short, in non-strict mode, HTMLCollection items are not writable. This blocks property assignment, allowing unexpected values to be created 😄

👉 mizu.re/post/under-t...

08.09.2025 15:10 👍 4 🔁 0 💬 0 📌 0
Preview
Cookie Chaos: How to bypass __Host and __Secure cookie prefixes Browsers added cookie prefixes to protect your sessions and stop attackers from setting harmful cookies. In this post, you’ll see how to bypass cookie defenses using discrepancies in browser and serve

We've just published a novel technique to bypass the __Host and __Secure cookie flags, to achieve maximum impact for your cookie injection findings: portswigger.net/research/coo...

03.09.2025 14:54 👍 12 🔁 14 💬 1 📌 0
Post image

Small teaser for Caido users :)

2/2

03.09.2025 14:34 👍 2 🔁 0 💬 0 📌 0
Post image

DOMLogger++ v1.0.9 is now out and available! 🎉

This update fixes a lot of issues, including the historical DevTools bug on Chromium 🔥

It also brings full Caido session handling, which is going to be useful in the near future! 👀

👉 github.com/kevin-mizu/d...

1/2

03.09.2025 14:34 👍 2 🔁 0 💬 1 📌 0
Preview
Exploring the DOMPurify library: Hunting for Misconfigurations (2/2). Tags:Article - Article - Web - mXSS Exploring the DOMPurify library: Hunting for Misconfigurations (2/2)

I was keeping this one for myself for a while, but after several discussions at DefCon I thought it would be nice to share it now :)

Btw! If you wonder how could this be abused, I recommend you looking at: mizu.re/post/explori... 😉

3/3

25.08.2025 16:17 👍 3 🔁 0 💬 0 📌 0
Post image

For example, using this configuration, it is possible to retrieve the @masatokinugawa.bsky.social CVEs in TinyMCE.

👉 subdomain1.portswigger-labs.net/xss/xss.php?...

2/3

25.08.2025 16:17 👍 1 🔁 0 💬 1 📌 0
Post image

I've released a DOMLogger++ config that helps detect any replacements occurring in a DOMPurify output by inserting and tracking a canary value at runtime.

I think it highlights how useful DOMLogger++ can be for tracking JS execution :D

👉 github.com/kevin-mizu/d...

1/3

25.08.2025 16:17 👍 3 🔁 0 💬 1 📌 0
Preview
HTTP/1.1 Must Die Upstream HTTP/1.1 is inherently insecure, and routinely exposes millions of websites to hostile takeover. Join the mission to kill HTTP/1.1 now

The whitepaper is live! Learn how to win the HTTP desync endgame... and why HTTP/1.1 needs to die: http1mustdie.com

06.08.2025 23:43 👍 40 🔁 22 💬 0 📌 2

This is still v1, there's lots to improve and many gadgets to add.

If you'd like to contribute or have any feedback, please don't hesitate to reach out 😁

4/4

24.07.2025 15:31 👍 0 🔁 0 💬 0 📌 0
Post image Post image Post image

Each library page includes:

* Affected versions
* A short description
* Root cause of the gadget
* Related links
* Credit to the discoverer
* And even a preview button to play with the gadget live!

3/4

24.07.2025 15:31 👍 0 🔁 0 💬 1 📌 0
Post image

The wiki lets you filter gadgets by browser, tags, attributes, CSP, and timing, making it as easy as possible to find interesting vectors (at least I hope so!) 🔎

2/4

24.07.2025 15:31 👍 0 🔁 0 💬 1 📌 0
Post image

I'm happy to release a script gadgets wiki inspired by the work of @slekies, @kkotowicz, and @sirdarckcat in their Black Hat USA 2017 talk! 🔥

The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs 👇

gmsgadget.com

1/4

24.07.2025 15:31 👍 23 🔁 13 💬 1 📌 0
Preview
Finding Freedom, One Bug at a Time: My Journey from Pentester to Full-Time Hunter After seven years in pentesting, I transitioned full-time into bug bounty hunting, leveraging deep experience and continuous learning. This article shares key moments and insights from that journey.

Today was my last day as a pentester at Bsecure. After a three-year journey of hunting on the side, I’m ready to go all-in as a full-time bug bounty hunter. You can read about my journey from pentester to full-time hunter here: gelu.chat/posts/from-p...

04.07.2025 15:09 👍 23 🔁 7 💬 3 📌 0
Post image Post image

I've released my CTF bot template! :D

It's not a big deal, but it comes with a heavily hardened Docker setup. The bot also sends a lot of debugging information over the TCP socket (console logs, navigation), which makes remote debugging much easier! 🔎

👉 github.com/kevin-mizu/b...

22.05.2025 18:03 👍 5 🔁 2 💬 0 📌 0
Preview
Confetti: Solution to my Intigriti May 2025 XSS Challenge - Johan Carlsson

Here is the official writeup of my XSS challenge on Intigriti. I think it contains some fun browser trivia even for those who did not look at the chall

joaxcar.com/blog/2025/05...

20.05.2025 15:59 👍 19 🔁 6 💬 1 📌 0
Post image

I'm thrilled to announce "HTTP/1 Must Die! The Desync Endgame", at #BHUSA! This is going to be epic, check out the abstract for a teaser ↓

14.05.2025 13:31 👍 38 🔁 18 💬 2 📌 1
Video thumbnail

Think you’ve seen every OS command injection trick?
Think again, read our latest blog post!
Link in the comments👇

30.04.2025 12:44 👍 27 🔁 9 💬 1 📌 1

Oups thank you 🙏

29.04.2025 07:08 👍 1 🔁 0 💬 0 📌 0
Join the FCSC & Hackropole Discord Server! Check out the FCSC & Hackropole community on Discord - hang out with 6259 other members and enjoy free voice and text chat.

All the other challenge write-ups (not just web) are available in the #writeup channel of the CTF Discord server:

discord.gg/rwZY6hh8z8

Thanks again to @ECSC_TeamFrance for the opportunity! 💙

2/2

28.04.2025 16:47 👍 3 🔁 0 💬 0 📌 0

The #FCSC2025 ended yesterday, and my write-ups are now available here 👇

mizu.re/post/fcsc-2025…

Btw, like every year, all the challenges have also been added to hackropole.fr! 🚩

1/2

28.04.2025 16:47 👍 6 🔁 2 💬 2 📌 0
Preview
Making the Unexploitable Exploitable with X-Mixed-Replace on Firefox - The Spanner In this post, we’ll look at an interesting difference in how Firefox and Chrome handle the multipart/x-mixed-replace content type. While Chrome treats it as an image, Firefox renders it as HTML - some...

Firefox treats multipart/x-mixed-replace like HTML. Chrome doesn’t.
That tiny difference? It can turn a "non-exploitable" XSS into a real one.
Abuse boundary handling, bypass filters, and make your payload land.

thespanner.co.uk/making-the-u...

25.04.2025 21:50 👍 19 🔁 9 💬 0 📌 0

This year again, with @bi.tk, we've made the Web challenges 🚩

The CTF is solo and lasts 10 days, if you have some time, please give it a look 😁

Btw, even if you're not doing Web challenges, there are 100+ challenges in various categories, you should find something you like!

18.04.2025 16:35 👍 14 🔁 4 💬 1 📌 1
Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls
Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls YouTube video by Black Hat

🔥 My Black Hat talk is now live! 🎥

Watch how email parsing quirks turned into RCE in Joomla and critical access control bypasses across major platforms. See how these subtle flaws led to serious exploits!

www.youtube.com/watch?v=Uky4...

20.03.2025 12:41 👍 23 🔁 6 💬 0 📌 0
Preview
SAML roulette: the hacker always wins Introduction In this post, we’ll show precisely how to chain round-trip attacks and namespace confusion to achieve unauthenticated admin access on GitLab Enterprise by exploiting the ruby-saml library

You might have noticed that the recent SAML writeups omit some crucial details. In "SAML roulette: the hacker always wins", we share everything you need to know for a complete unauthenticated exploit on ruby-saml, using GitLab as a case-study.

portswigger.net/research/sam...

18.03.2025 14:57 👍 53 🔁 23 💬 0 📌 4

For this challenge, it was necessary to abuse a discrepancy between the DOM and the rendered page in Firefox's cache handling 💽

👉 bugzilla.mozilla.org/show_bug.cgi...

This allows to shift iframe rendering from one to another leading to a sandbox bypass 🔥

👉 mizu.re/post/an-18-y...

02.03.2025 17:14 👍 9 🔁 1 💬 0 📌 0

Thanks for sharing 🫶

01.03.2025 09:24 👍 0 🔁 0 💬 1 📌 0
Post image

With @gelu.chat, we created a challenge for the @pwnmectf inspired by a bug he found in bug bounty a year ago! 🚀

If you have some time this weekend, give it a try! 👀

👉 pwnme.phreaks.fr

28.02.2025 21:23 👍 14 🔁 4 💬 0 📌 1
Post image

DOMLogger++ v1.0.8 is now out and available! 🎉

This update includes several UX improvements, such as syntax highlighting and new shortcuts. Major changes have been made to custom types and several annoying bugs have been fixed 🚀

👉 github.com/kevin-mizu/d...

27.02.2025 16:34 👍 8 🔁 1 💬 0 📌 0