- 👋 Hi, I’m @barakolo / @livingbeef on twitter
- 👀 I’m excited about InfoSec, cybersecurity and cool new research and exploits!
- 🌱 I’m currently probably learning new browser-features...
- 💞️ I’m looking to collaborate on new exciting research fields: cloud, IoT, browser-extensions and more! ✨
- 📫 How to reach me? DM me @livingbeef
- Tel-Aviv, Israel
- barakolo.me
- @livingbeef
Block or Report
Block or report barakolo
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abusePinned
-
Maltensions
Maltensions PublicPost-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".
-
VimiumUXSS
VimiumUXSS PublicUXSS exploit for vimium, the chrome extension (abusing the vomnibar feature)
JavaScript 1
-
ExtensionExploiter
ExtensionExploiter PublicExploits other extension (exploits zotero extension to xss all sites in its context)
JavaScript
-
DyGraphBio
DyGraphBio PublicA Dynamic Algorithm for Network Propagation. Presented @WABI2018 (part of ALGO2018).
C++ 1
-
-
If the problem persists, check the GitHub status page or contact support.