SecureLayer7

1.6K posts

SecureLayer7 banner
SecureLayer7

SecureLayer7

@SecureLayer7

Quick, reliable Pentest as a Service, API Security Scanning, and Offensive Security to uncover vulnerabilities and strengthen security posture

Austin, Tx Katılım Eylül 2014
22 Takip Edilen2.5K Takipçiler
SecureLayer7
SecureLayer7@SecureLayer7·
Open-sourced Sandyaa - autonomous source code auditor and finding zeroday is fun!! Point it at any repo, get runnable PoCs with evidence chains back to file. No API key piggybacks on your Claude Code CLI. github.com/securelayer7/s…
SecureLayer7 tweet media
English
0
2
5
218
SecureLayer7
SecureLayer7@SecureLayer7·
As a pentest engagement leader, how do you usually react when you get a bloated, noisy pentest report?
English
1
0
1
254
SecureLayer7
SecureLayer7@SecureLayer7·
Join cybersecurity leaders for a fireside chat on spotting false positives in pentest reports, prioritizing real risks, and improving remediation workflows. Who Should Attend: CISOs, Security leaders, pentesters, and security teams. Register here - us06web.zoom.us/webinar/regist…
English
0
0
0
122
SecureLayer7
SecureLayer7@SecureLayer7·
We will continue expanding this list based on our experiences at SL7 and contributions from others until January 31, 2025, after which the list will be finalized. Feel free to submit pull requests!
English
0
0
1
88
SecureLayer7
SecureLayer7@SecureLayer7·
Updated: Top 2025 vulnerabilities you shouldn’t accept in a pentest report [DRAFT] Introducing three different sections: 1. Minor Infrastructure Information Exposure 2. Reporting Unexploitable Vulnerabilities 3. Problems Without Security-Related Impact github.com/securelayer7/n…
English
1
0
1
165
SecureLayer7 retweetledi
Seasides
Seasides@seasides_conf·
We extend our heartfelt gratitude to SecureLayer7 for being a Gold Sponsor of the Seasides Conference! Your invaluable support plays a vital role in fostering knowledge-sharing within the security community. Thank you, SecureLayer7 Sandeep Kamble , for championing this mission
Seasides tweet media
English
3
15
21
436
SecureLayer7
SecureLayer7@SecureLayer7·
@0xTib3rius Valid point - context is critical. and updated with this details Some browsers (Chrome) delay or throttle background requests in inactive tabs meaning keep-alive signals might not be sent on time. This could lead the session to persist longer than expected even with a timeout set
English
0
0
0
8
Tib3rius
Tib3rius@0xTib3rius·
Some of these are good. Some are questionable. There's a lot that really require context. For example, saying that long session timeouts "isn't a vulnerability; it's a design decision". Well, it *can* be a design decision. What if it's not? What if the developer used a bad default value? Pentesters shouldn't make assumptions about these things. Customers are perfectly capable of accepting the risk of findings in a report.
SecureLayer7@SecureLayer7

Top 2025 vulnerabilities you shouldn’t accept in a pentest report. Here is list! Looking for more such scenarios. github.com/securelayer7/n…

English
2
1
12
4.1K
SecureLayer7 retweetledi
SecureLayer7
SecureLayer7@SecureLayer7·
Top 2025 vulnerabilities you shouldn’t accept in a pentest report. Here is list! Looking for more such scenarios. github.com/securelayer7/n…
English
4
6
42
25.7K
SecureLayer7
SecureLayer7@SecureLayer7·
@albinowax You make a valid point! While a strict CSP can significantly reduce the risk of XSS, it isn't a foolproof solution. Especially with creative exploitation techniques like JSONP abuse, improperly sanitized data in inline event handlers, or compromised third-party scripts. REMOVED.
English
0
0
1
67