<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Alec Maly&apos;s Tech Blog</title><description>Alec Maly&apos;s software and cybersecurity tech blog.</description><link>https://alecmaly.com/</link><item><title>Hasbro | MTG Arena: TextMeshPro injection via. WOTC DisplayName = 100% win rate against Desktop and iPad opponents</title><link>https://alecmaly.com/blog/2025/11/26/MTG-Arena-TextMeshPro-Injection/</link><guid isPermaLink="true">https://alecmaly.com/blog/2025/11/26/MTG-Arena-TextMeshPro-Injection/</guid><description>TextMeshPro markup injection leads to whited out screen.</description><pubDate>Wed, 26 Nov 2025 00:00:00 GMT</pubDate></item><item><title>Exploiting Cooke Based Self-XSS</title><link>https://alecmaly.com/blog/2025/07/16/Exploiting-Cookie-Based-Self-XSS/</link><guid isPermaLink="true">https://alecmaly.com/blog/2025/07/16/Exploiting-Cookie-Based-Self-XSS/</guid><description>A mildly interesting self-xss with some additional security content &amp; best practices worth reviewing.</description><pubDate>Wed, 16 Jul 2025 00:00:00 GMT</pubDate></item><item><title>Resolving Undocumented AWS Codebuild Errors and Discussing CI/CD GitHub Integration Security</title><link>https://alecmaly.com/blog/2025/06/17/Resolving-Undocumented-AWS-Codebuild-Errors-and-Discussing-CICD-GitHub-Integration-Security/</link><guid isPermaLink="true">https://alecmaly.com/blog/2025/06/17/Resolving-Undocumented-AWS-Codebuild-Errors-and-Discussing-CICD-GitHub-Integration-Security/</guid><description>Resolving an undocumented AWS Codebuild error and describing GitHub App integration security considerations.</description><pubDate>Tue, 17 Jun 2025 00:00:00 GMT</pubDate></item><item><title>[$15,000 Bounty] M365 Phish: Power Platform Privilege Escalation and Pivoting</title><link>https://alecmaly.com/blog/2024/02/29/M365-Phish-Power-Platform-Pivoting-and-Privilege-Escalation/</link><guid isPermaLink="true">https://alecmaly.com/blog/2024/02/29/M365-Phish-Power-Platform-Pivoting-and-Privilege-Escalation/</guid><description>Exploring the M365 Power Platform as a means of privilege escalation and flexing control over a phishing victim&apos;s SharePoint, OneDrive, Outlook, and Microsoft Teams data. </description><pubDate>Thu, 29 Feb 2024 00:00:00 GMT</pubDate></item><item><title>[$1250 - High Severity] Bypassing Brower Extension&apos;s Geolocation Spoofing with a Malicious Website (Location Guard &amp; ExpressVPN)</title><link>https://alecmaly.com/blog/2023/08/28/Bypassing-Browser-Extensions-Geolocation-spoofing-to-Disclose-Physical-Location/</link><guid isPermaLink="true">https://alecmaly.com/blog/2023/08/28/Bypassing-Browser-Extensions-Geolocation-spoofing-to-Disclose-Physical-Location/</guid><description>Bypassing the spoof geolocation feature in browser extensions to disclose the physical location of a user. I share two high severity bugs. Bug 1 is a generic payload that works across multiple extensions, and bug 2 is an ExpressVPN specific payload that has been patched. This post is a case study with the Location Guard &amp; ExpressVPN extensions, my bug bounty experience, and a few takeaways that may prove insightful for others.</description><pubDate>Mon, 28 Aug 2023 00:00:00 GMT</pubDate></item><item><title>Optimizing Multi-Destination Routes with Google Maps and a Chrome Extension</title><link>https://alecmaly.com/blog/2022/11/07/Optimizing-Multi-Destination-Routes-with-Google-Maps-and-a-Chrome-Extension/</link><guid isPermaLink="true">https://alecmaly.com/blog/2022/11/07/Optimizing-Multi-Destination-Routes-with-Google-Maps-and-a-Chrome-Extension/</guid><description>Finding the best route between multiple destinations in Google Maps or other tools can be frustrating. I have created a bespoke Chromium browser extension to help calculate a relatively optimal multi-destination travel route. Usage: Install the extension, navigate to https://maps.google.com, and use the tool.</description><pubDate>Mon, 07 Nov 2022 00:00:00 GMT</pubDate></item><item><title>M365 Internal Phish: Abusing the Power Platform for SharePoint/OneDrive Privilege Escalation</title><link>https://alecmaly.com/blog/2022/05/13/Abusing-SharePoint-and-OneDrive-Permissions-with-PowerApps-and-Flow/</link><guid isPermaLink="true">https://alecmaly.com/blog/2022/05/13/Abusing-SharePoint-and-OneDrive-Permissions-with-PowerApps-and-Flow/</guid><description>An internal phishing POC leveraging Microsoft 365 citizen development tools (Power Platform). Phish for access to a target user&apos;s OneDrive and all SharePoint sites they own. </description><pubDate>Fri, 13 May 2022 00:00:00 GMT</pubDate></item><item><title>Image Slicing with Python</title><link>https://alecmaly.com/blog/2022/01/25/Image-Slicing-With-Pyhon/</link><guid isPermaLink="true">https://alecmaly.com/blog/2022/01/25/Image-Slicing-With-Pyhon/</guid><description>Slicing and manipulating images with a Python GUI program using the Pillow and tkinter GUI packages.</description><pubDate>Tue, 25 Jan 2022 00:00:00 GMT</pubDate></item><item><title>Download and Sort HackerOne Hacktivity Reports Using GraphQL Introspection</title><link>https://alecmaly.com/blog/2022/01/12/Download-and-Sort-HackerOne-Hacktivity-Reports-Using-GraphQL-Introspection/</link><guid isPermaLink="true">https://alecmaly.com/blog/2022/01/12/Download-and-Sort-HackerOne-Hacktivity-Reports-Using-GraphQL-Introspection/</guid><description>HackerOne hacktivity reports can have very useful (and interesting) content for learning how to test real systems for vulnerabilities. Unfortunately, it&apos;s impossible to sort on interesting fields such as severity and bounty from within the Hacktivity web UI. The goal of this post is to demonstrate a means of filtering/sorting HackerOne reports in an attempt to find writeups with valuable techniques/methodologies/strategies or other interesting information.</description><pubDate>Wed, 12 Jan 2022 00:00:00 GMT</pubDate></item><item><title>My First Wordpress Site: olgastherapy.com</title><link>https://alecmaly.com/blog/2022/01/04/My-First-Wordpress-Site-Olgas-Therapy/</link><guid isPermaLink="true">https://alecmaly.com/blog/2022/01/04/My-First-Wordpress-Site-Olgas-Therapy/</guid><description>Configuring wordpress and email for a small business by leveraging an always free Oracle cloud VPS, Google Workspace, and an assortment of free/trial tooling.</description><pubDate>Tue, 04 Jan 2022 00:00:00 GMT</pubDate></item><item><title>Game Hacking: Extracting Meshes to Make a Minimap HUD</title><link>https://alecmaly.com/blog/2021/12/08/Game-Hacking-Extracting-Meshes-to-Make-a-Minimap-HUD/</link><guid isPermaLink="true">https://alecmaly.com/blog/2021/12/08/Game-Hacking-Extracting-Meshes-to-Make-a-Minimap-HUD/</guid><description>Extracting/ripping game meshes to create a minimap Heads Up Display (HUD) showing player position.</description><pubDate>Wed, 08 Dec 2021 00:00:00 GMT</pubDate></item><item><title>Debugging a Race Condition Between Microsoft Edge and SharePoint</title><link>https://alecmaly.com/blog/2021/11/23/Edge-SharePoint-Debugging-Race-Condition/</link><guid isPermaLink="true">https://alecmaly.com/blog/2021/11/23/Edge-SharePoint-Debugging-Race-Condition/</guid><description>A random redirect when opening Edge leads to an investigation discovering some interesting behavior between Edge and SharePoint.</description><pubDate>Tue, 23 Nov 2021 00:00:00 GMT</pubDate></item><item><title>Scanning and Hooking Dynamic, Client-Side Data in Modern Web Applications</title><link>https://alecmaly.com/blog/2021/11/22/Scanning-and-Hooking-Dynamic-Client-Side-Data-in-Modern-Web-Applications/</link><guid isPermaLink="true">https://alecmaly.com/blog/2021/11/22/Scanning-and-Hooking-Dynamic-Client-Side-Data-in-Modern-Web-Applications/</guid><description>Scanning the DOM for interesting data + hooking getters/setters. Demonstrating POC w/ a PowerApps example.</description><pubDate>Mon, 22 Nov 2021 00:00:00 GMT</pubDate></item><item><title>Finding Vulnerabilities in an 18 Year Old MMO</title><link>https://alecmaly.com/blog/2021/11/12/Finding-Vulnerabilities-in-an-18-Year-Old-MMO/</link><guid isPermaLink="true">https://alecmaly.com/blog/2021/11/12/Finding-Vulnerabilities-in-an-18-Year-Old-MMO/</guid><description>Finding and abusing size constrained XSS and a payment gateway bypass in an 18 year old MMO.</description><pubDate>Fri, 12 Nov 2021 00:00:00 GMT</pubDate></item><item><title>Exploring the WinDbg Preview JavaScript API</title><link>https://alecmaly.com/blog/2021/10/22/Exploring-the-WinDbg-Preview-JavaScript-API/</link><guid isPermaLink="true">https://alecmaly.com/blog/2021/10/22/Exploring-the-WinDbg-Preview-JavaScript-API/</guid><description>Trying to recreate the x32dbg/x64dbg stacktrace and dereferencing features in WinDbg Preview by leveraging its JavaScript API. Additionally, playing with Time Travel Debugging (TTD) and inspecting memory on the heap. POC included.</description><pubDate>Fri, 22 Oct 2021 00:00:00 GMT</pubDate></item><item><title>Hacking Electron Apps: Joplin</title><link>https://alecmaly.com/blog/2021/10/12/Hacking-Electron-Apps-Joplin/</link><guid isPermaLink="true">https://alecmaly.com/blog/2021/10/12/Hacking-Electron-Apps-Joplin/</guid><description>Adding custom functionality to the Joplin note-taking app by injecting arbitrary JavaScript into source code. POC included.</description><pubDate>Tue, 12 Oct 2021 00:00:00 GMT</pubDate></item><item><title>Adventures in Open Source Contributing: Joplin</title><link>https://alecmaly.com/blog/2021/10/11/Adventures-in-open-source-contributing-Joplin/</link><guid isPermaLink="true">https://alecmaly.com/blog/2021/10/11/Adventures-in-open-source-contributing-Joplin/</guid><description>Fixing a bug in open source software leads to diagnosing a systemic unit testing bug.</description><pubDate>Mon, 11 Oct 2021 00:00:00 GMT</pubDate></item><item><title>Android Hacking Tips and Tricks with Frida &amp; BurpSuite</title><link>https://alecmaly.com/blog/2021/10/10/Android-Hacking-Tips-and-Tricks-with-Frida-and-BurpSuite/</link><guid isPermaLink="true">https://alecmaly.com/blog/2021/10/10/Android-Hacking-Tips-and-Tricks-with-Frida-and-BurpSuite/</guid><description>Learning by modifying an android .apk, intercepting + decrypting network traffic, and poking at game memory (changing function arguments + return values / calling functions by virtual address).</description><pubDate>Sun, 10 Oct 2021 00:00:00 GMT</pubDate></item></channel></rss>