sebsrt

40 posts

sebsrt banner
sebsrt

sebsrt

@s3bsrt

I like to break stuff | Web Vuln Research & CTF @ARESxCTF @aboutblankets

Italy Katılım Şubat 2022
518 Takip Edilen700 Takipçiler
Sabitlenmiş Tweet
sebsrt
sebsrt@s3bsrt·
I’ve been digging into HTTP Trailers and found some new smuggling techniques: sebsrt.xyz/blog/trailing-…
English
4
103
404
39.2K
sebsrt retweetledi
slonser
slonser@slonser_·
And this makes sense given how many CTFs are held per year. However, the ideal CTF challenge, in my opinion, should follow this formula: "The author conducted a mini-research project and instead of publishing it, turned it into a challenge."
English
3
15
124
12.6K
Evan Klein
Evan Klein@EvanKlein338226·
@s3bsrt Solid writeup! Deserialization vulns in JS frameworks are often overlooked. Did you find this through code review or fuzzing?
English
1
0
1
169
sebsrt
sebsrt@s3bsrt·
I found an interesting RCE due to unsafe deserialization in qwik js framework. I'll post the writeup analysis github.com/QwikDev/qwik/s…
English
0
26
154
8.4K
🦇 ©
🦇 ©@Blackstone0123·
@s3bsrt So edit the token, alg to none, and sub to victim Google account id lead to account takeover on any website using Google Auth, right?
English
1
0
0
329
sebsrt
sebsrt@s3bsrt·
@deadvolvo Let us know if you find something cool😁
English
0
0
3
216
d3d aka dead (dead, мёртв, 死了)
@s3bsrt This is really cool, and similar to some techniques I've written about before but you are using a slightly different method for getting those trailing headers to be accepted during "normalization." Really interested man, great work s3b. 🔥
English
1
0
9
2.1K
sebsrt retweetledi
RewriteLab
RewriteLab@RewriteLab·
Hello! We’ve just launched a new wargame site called damn vulnerable web! It consists only of web challenges, primarily designed for intermediate to advanced players rather than beginners. We hope this wargame helps more people gain deeper and broader knowledge in web hacking :) For now, we’re planning to accept only 300 users initially for open beta testing and capacity checks. Starting from this tweet, we’ll gradually increase the number of allowed sign-ups each week. Your interest and support will be a huge help to our future activities We’ll do our best to deliver even better work going forward. Thank you! Wargame site: wargame.rewritelab.org Join our Discord: discord.gg/wYAm2n4M4J
RewriteLab tweet media
English
6
94
534
27.3K
zhero;
zhero;@zhero___·
Happy to publish our first research of the year on the SvelteKit framework, downloaded over 800,000 times per week, which led to CVE-2025-67647 (w/@inzo____): Avoiding the paradox: A native full-read SSRF and one‑shot DoS in SvelteKit zhero-web-sec.github.io/research-and-t… Enjoy the read
zhero; tweet media
English
8
62
342
15.4K
sebsrt
sebsrt@s3bsrt·
TR.MRG HTTP Request Smuggling? author writeup for Trailing Danger - m0lecon 2026 teaser CTF 👉github.com/sebastianosrt/… I'll share more about trailer fields parsing vulnerabilities soon.
sebsrt tweet media
English
6
40
196
13.3K
sebsrt retweetledi
watchTowr
watchTowr@watchtowrcyber·
The watchTowr Labs team is back, providing our full analysis of the Oracle E-Business Suite Pre-Auth RCE exploit chain (CVE-2025-61882). Enjoy with us (or cry, your choice..) labs.watchtowr.com/well-well-well…
English
5
138
383
95.8K
sebsrt
sebsrt@s3bsrt·
@intigriti ';alert()// htmlspecialchar escapes ' only when ENT_QUOTES is set
English
1
0
9
1.5K
Intigriti
Intigriti@intigriti·
Can you pop an alert? 😎
Intigriti tweet media
English
9
6
145
22.3K