Advertisement · 728 × 90

Posts by Senyals

Preview
GitHub - OWASP/wrongsecrets: Vulnerable app with examples showing how to not use secrets Vulnerable app with examples showing how to not use secrets - OWASP/wrongsecrets

We released version 1.11.2 of #OWASP #WrongSecrets: it's faster than ever, has now 55 challenges and a lot of fun! Check it out at github.com/OWASP/wrongs... or test it at www.wrongsecrets.com and don't forget to give the repo a 🌟 if you like it!

11 months ago 17 6 1 1
Post image

I just built a custom action to let you test for race conditions with a single click! No tab groups required, and it uses the cutting edge single-packet attack under the hood: gist.github.com/albinowax/10...

For more info check out portswigger.net/research/sma...

11 months ago 16 2 0 0
Post image

Ever heard of LLM poisoning? 🤔

Recently, Leif Dreizler joined Travis McPeak and William Bengtson on the @404security.bsky.social podcast to discuss how misinformation websites are intentionally spreading fake news to influence AI model responses.

🎧 Listen here: www.resourcely.io/podcast/deal...

1 year ago 3 1 0 0

I will for sure!

1 year ago 1 0 0 0

I will attend!

1 year ago 1 0 1 0
Preview
Lesley, What Happened to the “Cybersecurity Skills Shortage”? Are you stressed out right now? I’m stressed out. Most Americans are, and cybersecurity job seekers are definitely not an exception. I do a ton of career mentoring and career clinics, and I s…

Hello friends. The dreaded and long awaiting blog on WHAT THE FUCK HAPPENED TO THE CYBERSECURITY JOBS MARKET has arrived.

tisiphone.net/2025/04/01/l...

I'm sorry.

1 year ago 275 84 16 10
Post image

As a follow up to @maxenceschmitt.bsky.social's amazing #CSPT research, we've published a list of resources to help people interested in this class of vulnerabilities. Check it out today for video, tools, challenges and variety of publications!

blog.doyensec.com/2025/03/27/c...

#Doyensec #appsec

1 year ago 2 2 0 0
Preview
State of Threat Modeling (SOTM) 2024 Survey Welcome to the first-ever State of Threat Modeling (SOTM) Survey! What is the SOTM Survey? The SOTM Survey is part of the research for the first community-driven State of Threat Modeling (SOTM) Repor...

The Threat Modeling Connect community are launching the first-ever community-driven State of Threat Modeling (SOTM) Report, led by @rewtd.bsky.social
and Dave Soldera, and we’d love your input!
docs.google.com/forms/d/e/1F...
The survey will take 15-20 minutes to complete.

#cybersec #infosec

1 year ago 21 15 0 0
Post image Post image

OWASP Global AppSec EU 2025 Barcelona: full training schedule is out now!

Day 3 is packed with even more hands-on training sessions to enhance your AppSec expertise!

Register now:
owasp.glueup.com/eve...

#AppSecEU2025 #Cybersecurity #DevSecOps #SecureCoding #ThreatModeling #Infosec #Barcelona

1 year ago 3 1 0 0
Advertisement
Post image

Exciting news! The #OWASP Global #Appsec SF videos have arrived! 🎥 Get ready to boost your knowledge and skills by checking them out here: www.youtube.com/play...

1 year ago 3 1 0 0
Preview
SAML roulette: the hacker always wins Introduction In this post, we’ll show precisely how to chain round-trip attacks and namespace confusion to achieve unauthenticated admin access on GitLab Enterprise by exploiting the ruby-saml library

You might have noticed that the recent SAML writeups omit some crucial details. In "SAML roulette: the hacker always wins", we share everything you need to know for a complete unauthenticated exploit on ruby-saml, using GitLab as a case-study.

portswigger.net/research/sam...

1 year ago 53 23 0 4
Slack Invite

There's now a ZAP Slack that's open to everyone. You can get an invite to it via zaproxy.org/slack/invite

1 year ago 9 6 0 0
AppSec Ezine

AppSec Ezine - 573rd pathonproject.com/zb/?3970e59b... #AppSec #Security 🎁

1 year ago 5 5 0 0
Post image

🤔 Based on issues that I have seen during recent assessments, I updated my code sharing project with a method related to JWT based tokens:

#appsec #appsecurity #jwt #web

🌍 URL:
github.com/righettod/co...
righettod.github.io/code-snippet...

1 year ago 1 1 0 0
Post image

Get ready for an eye-opening session with Kevin Hemmingsen, Director of Trust & Security at Bugcrowd as he explores lessons from bug bounty / offsec to help devs build more securely at the OWASP Security Summit!

OWASP Community Save 25% on tickets: http://www.eventbrit

1 year ago 3 1 0 0

Practice on Portswigger Academy

1 year ago 1 0 0 0
Preview
Top 10 web hacking techniques of 2024 Welcome to the Top 10 Web Hacking Techniques of 2024, the 18th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year

The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2024! portswigger.net/research/top...

1 year ago 66 36 2 5
GET /%0D%0ASet-Cookie: foo=bar
403 Forbidden

GET /%E4%BC%8D%E4%BC%8ASet-Cookie: foo=bar
200 OK
Set-Cookie: foo=bar

GET /%0D%0ASet-Cookie: foo=bar 403 Forbidden GET /%E4%BC%8D%E4%BC%8ASet-Cookie: foo=bar 200 OK Set-Cookie: foo=bar

Discover blocklist bypasses via unicode overflows using the latest updates to ActiveScan++, Hackvertor & Shazzer! Thanks to Ryan Barnett and Neh Patel for sharing this technique.

portswigger.net/research/byp...

1 year ago 38 22 0 0
Post image

Sarah-Jane Madden is a keynote speaker at OWASP Global AppSec EU 2025

🎟️ Attention to those in App Sec, Cybersecurity, and Developers: take advantage of the early bird discount!

Don’t wait, register now!

owasp.glueup.com/eve...

#owaspglobalappseceu2025 #AI #threatmodeling #devsecops #infosec

1 year ago 5 1 0 0
Advertisement

I've just released HTTP Request Smuggler 2.17 which fixes a nasty Client-Side Desync false-negative. Big thanks to @t0xodile.com for reporting it! Hope you all find some nice CSDs in 2025 :)

1 year ago 33 5 1 1
Preview
First Tokens: The Achilles’ Heel of LLMs The Assistant Prefill feature available in many LLMs can open up models to jailbreaking, including the possibility of persistent prefills to bypass LLM safety alignments.

The article: www.invicti.com/blog/securit...

1 year ago 11 1 2 0
Preview
Top ten web hacking techniques of 2024: nominations open Nominations are now open for the top 10 new web hacking techniques of 2024! Every year, security researchers from all over the world share their latest findings via blog posts, presentations, PoCs, an

Nominations are now open for the Top 10 Web Hacking Techniques of 2024! Browse the contestants and submit your own here:
portswigger.net/research/top...

1 year ago 28 19 1 4
Post image

🚨 Attention all developers and code enthusiasts! Get ready to elevate your skills with "Alice and Bob Learn Secure Coding." Secure your copy now and embark on a transformative learning experience.
shehackspurple.ca/bo...

1 year ago 9 3 0 0
Preview
Burp suite pro tips and tricks for hacking Burp suite pro tips and tricks for hacking - Download as a PDF or view online for free

Somebody uploaded to SlideShare the slides of my talk at @northsec.bsky.social 2023 🌐

It’s the sequel of the first @burpsuite.bsky.social talk I ever gave, exactly 10 years before 🛠️

Enjoy these 50 slides of Burp tips 🎁🎅

1 year ago 38 18 0 0

Extended the starter with shy writers! 😀 If you're not on the list but write about web security, then feel free to reply with the article you're most proud of, and I will add you to the pack!

Make sure to resubscribe to not not miss on the amazing 🌐research!

go.bsky.app/9JXnB17

1 year ago 29 10 9 0
Screenshot of Burp's HTTP settings, where streaming URLs must be defined

Screenshot of Burp's HTTP settings, where streaming URLs must be defined

Chunked response as seen in Repeater, with chunk metadata (their size) not stripped

Chunked response as seen in Repeater, with chunk metadata (their size) not stripped

Ever wondered why you NEVER see chunked responses in Burp? 🤔

The answer is simple, default settings hide them! 🫣

Go to "Settings > Network > HTTP > Streaming responses" to make them appear 🔍

1 year ago 20 6 0 2

Check out the tools I've been working on this year:
🔐 Hackvertor: Web app: hackvertor.co.uk
🔒 Hackvertor BApp: portswigger.net/bappstore/65...
⚡ Shazzer: shazzer.co.uk
🛠️ Recorder: Chrome extension: chromewebstore.google.com/detail/burp-...
🕵️ DOM Invader: portswigger.net/burp/documen...

1 year ago 16 4 0 0
Advertisement
Overview of the attack flow

Overview of the attack flow

Overview of how a large number of credentials were leaked

Overview of how a large number of credentials were leaked

Clusters of fake GitHub profiles

Clusters of fake GitHub profiles

Phishing e-mail

Phishing e-mail

New research: We've been monitoring a threat actor publishing dozens of trojanized GitHub repositories targeting threat actors, leaking hundreds of thousands of credentials along the way

securitylabs.datadoghq.com/articles/mut...

1 year ago 21 13 0 0
Post image

🤫 #sneakpeek #BurpSuite #Intruder

1 year ago 11 4 2 0
Preview
How does Snyk DCAIF Work under the hood? | Snyk Read our technical deep-dive into how Snyk's DCAIF works. To start, with Snyk's Deep Code AI Fix, simply register for a Snyk account here, enable DeepCode AI Fix in your Snyk settings, and start reliably auto-fixing vulnerabilities in seconds.

Snyk SAST has a pretty clever trick to find and fix security vulnerabilities in your code

It applies a CodeReduce algorithm to "compress" your own program code before feeding it to an AI model and this results in improved by 20% success rate of security fixes:

1 year ago 6 1 0 0