Show newer

Twitter Crosspost 

RT @404Mity
always found it werid nekojiru fans never translated any soseji manga

Twitter Crosspost 

RT @MrkySpices
this sprite is actually a remake of one of my old sprites back in 2020.

susie sold seperately.
twitter.com/MrkySpices/status/

Twitter Crosspost 

RT @TheBitw24
Every fight Gogeta’s been in

Twitter Crosspost 

RT @TurboJehtt
Trust me and we will escape from federal prison (ft. @izziibel)

Twitter Crosspost 

RT @LumLotus
No they think everyone on there is exactly the type of assholes they are being. (Hope everyone used a vpn and an alternative email like they were already suppose to be doing.) twitter.com/litdogger/status/1

Twitter Crosspost 

RT @MutantDogz
OMG i forgot about this world pic i took while on an world exploration!

Twitter Crosspost 

RT @OscarVReuenthal
I used to look at KiwiFarms just to see what it was about, and this is why I created a separate email account under a fake name in order to access it. twitter.com/litdogger/status/1

Twitter Crosspost 

RT @dardartYT
i think teen titans go is a great example of great animators having to make dog shit for the majority of the series

Twitter Crosspost 

RT @IMakeCowboysGay
first game of the season and its a win with the oomfie

Twitter Crosspost 

never forget the time that someone featured in a 3kliksphilip video had cropped furry porn as their avatar

Twitter Crosspost 

RT @JARG_7
I went to the zoo and the highlight was watching a giant grasshopper take a dump.

Twitter Crosspost 

These are the kinds of people who support Keffals. Hurting the security of thousands of innocent people in order to retaliate against one that they don't like.

@josh iirc
Content-Security-Policy: script-src <source> <source>;
means either of the sources is allowed, not that you need both to apply
so troonshine.opus would be loaded just fine with 'self'
from there it's https://book.hacktricks.xyz/pentesting-web/content-security-policy-csp-bypass#file-upload-+-self
as for how you'd put it there, i'd reckon one of the many .innerHTML = userinput; since all of them seem unsanitized
Challenge for security experts: explanation of the XenForo scripting vulnerability.
t.me/kiwifarms/50
Yesterday, Vsys, a host we used as a forward-proxy, was compromised.

Today, the site was hacked to change everyone's avatars to logos of Poast.

Then, each node on the forum index was deleted one at a time.

There are backups of the site so no information is permanently lost but I have not diagnosed what the attack vector was yet or the extent of the breach.
Show older
Game Liberty Mastodon

Mainly gaming/nerd instance for people who value free speech. Everyone is welcome.