The Fragile Lock: Novel Bypasses for SAML Authentication will premiere this Wednesday at 10:20 at Black Hat Europe! I'll show you how to chain XML parser quirks to achieve complete authentication bypasses on multiple popular libraries #BHEU @blackhatevents.bsky.social
08.12.2025 15:49
π 4
π 0
π¬ 0
π 0
I am very proud of this h1 achievement!
20.11.2025 13:37
π 8
π 1
π¬ 0
π 0
Iβm excited to announce that Iβll be presenting The Fragile Lock: Novel Bypasses for SAML Authentication at Black Hat Europe! In this talk, Iβll show how I was able to continuously bypass security patches to achieve complete auth bypass for major libraries. #BHEU @blackhatevents.bsky.social
07.10.2025 14:55
π 26
π 6
π¬ 0
π 0
Join the PortSwigger Discord Server!
A place where security professionals, hobbyists, and passionate Burp users can hang out, chat, and collaborate. | 12858 members
WebSocket security testing is so painful that this ever -expanding attack surface is largely overlooked. Learn how to dive where others fear to tread with WebSocket Turbo Intruder.
Join me live on Sept 17 at 4PM (GMT+1)
discord.gg/portswigger?...
11.09.2025 15:36
π 4
π 1
π¬ 0
π 0
Cookie Chaos: Exploiting Parser Discrepancies - Zack
YouTube video by SteelCon
For a visual walkβthrough, see the @steelcon.info livestream recording: youtu.be/wxu1axAdPhw?...
03.09.2025 14:56
π 4
π 2
π¬ 0
π 0
I love discrepancies so much that I decided to introduce them to my nickname too @d4d89704243.bsky.social β
@zakfedotkin.bsky.social
Because why be consistent when you can keep people guessing?
25.07.2025 13:48
π 1
π 0
π¬ 0
π 0
26.06.2025 14:00
π 3
π 0
π¬ 0
π 0
Thrilled to announce: Iβll be presenting a major new version of WebSocket Turbo Intruder at Black Hat Arsenal 2025! This open-source toolkit makes high-speed, advanced WebSocket attacks practical and painless.
26.06.2025 13:56
π 9
π 3
π¬ 1
π 0
Active Scan++ just got sharper - weβve added new checks for OS command injection, powered by our latest ASCII Control Characters research. Install via Extensions -> BApp Store
28.05.2025 14:56
π 10
π 6
π¬ 1
π 0
Thank you @agarri.fr fixed
01.05.2025 12:28
π 2
π 0
π¬ 0
π 0
Think youβve seen every OS command injection trick?
Think again, read our latest blog post!
Link in the commentsπ
30.04.2025 12:44
π 27
π 9
π¬ 1
π 1
Iβm excited to introduce Namespace Confusion, a novel attack discovered during Gareth's and mySAML Roulette: The Hacker Always Wins research. We uncovered a brutal attack on XML signature validation that destroys authentication in Ruby-SAML!
18.03.2025 15:01
π 23
π 6
π¬ 0
π 0
Today's update to the URL Validation Bypass Cheat Sheet includes a new trick: bypassing domain allow lists using a full URL in the query, submitted by Alexis Hapiot!
This idea came after our previous update from @dyak0xdb, which sparked great discussions! More updates are live. Link in the reply π
05.03.2025 13:35
π 19
π 5
π¬ 1
π 0
We've updated our URL validation bypass cheat sheet with this shiny Domain allow list bypass payload contributed by dyak0xdb!
06.02.2025 09:17
π 28
π 9
π¬ 1
π 0
GET /%0D%0ASet-Cookie: foo=bar
403 Forbidden
GET /%E4%BC%8D%E4%BC%8ASet-Cookie: foo=bar
200 OK
Set-Cookie: foo=bar
Discover blocklist bypasses via unicode overflows using the latest updates to ActiveScan++, Hackvertor & Shazzer! Thanks to Ryan Barnett and Neh Patel for sharing this technique.
portswigger.net/research/byp...
28.01.2025 14:01
π 38
π 22
π¬ 0
π 0
Ruby secret_key_base can be decrypted from credentials.yml.enc file using following java code:
20.12.2024 14:00
π 1
π 0
π¬ 0
π 0
New in SignSaboteur v1.0.6!
Now supports Ruby on Rails Encrypted Cookies:
- Brute force secret keys
- Decrypt cookie values
Update now:
20.12.2024 13:40
π 8
π 2
π¬ 1
π 0
I really liked how this research turned out. I hope you did too.
04.12.2024 15:24
π 14
π 4
π¬ 1
π 0