d4d89704243 Profile Banner
d4d Profile
d4d

@d4d89704243

Followers
1K
Following
149
Statuses
106

Zakhar Fedotkin All thought are mine and mine alone

Joined July 2019
Don't wanna be here? Send us removal request.
@d4d89704243
d4d
5 months
Get the most out of our new URL Validation Bypass Cheat Sheet! Read our latest blog post for a comprehensive guide on how to use this tool -
2
69
245
@d4d89704243
d4d
4 days
@0xTib3rius @Rhynorater @dyak0xdb Agree, the payload exploit the mandatory / at hostname. Interestingly, that Q-encoding can be used at HTTP requests too. @garethheyes demonstrated the technique in his research
0
0
4
@d4d89704243
d4d
4 days
Check it out here👇
0
4
28
@d4d89704243
d4d
5 days
RT @PortSwiggerRes: The results are in! We're proud to announce the Top ten web hacking techniques of 2024!
0
267
0
@d4d89704243
d4d
11 days
RT @t0xodile: Officially in the BApp store! The research is in the thread if you'd like to understand more. Otherwise, go ahead and try out…
0
2
0
@d4d89704243
d4d
11 days
Bypass Bot Detection now in BApp store! - The extension now parses the User-Agent header and suggests matching TLS ciphers in the context menu. - You can still manually set a TLS cipher suite if the User-Agent header is unknown. Stay stealthy!
@BApp_Store
BApp Store
11 days
Bypass Bot Detection, a @PortSwiggerRes extension, is now live in the BApp Store! This extension helps you bypass TLS fingerprinting by mimicking browser fingerprints and brute-forcing protocol/cipher combinations
1
2
13
@d4d89704243
d4d
18 days
@ankursundara While working on the Memcached Injections research I did not think about the client side of this attack. The great blog post by @ankursundara made me look at this class of vulnerabilities differently. But that's not all, part 3 is ahead!
0
0
5
@d4d89704243
d4d
18 days
RT @ankursundara: @d4d89704243 Love the name Cookie Sandwich. I talked a bit about this idea in this blog post and…
0
7
0
@d4d89704243
d4d
18 days
RT @albinowax: Thanks for your all your votes! The public vote is now closed, and we're kicking off the panel vote with fifteen quality nom…
0
9
0
@d4d89704243
d4d
24 days
@slonser_ @albinowax @kobi_hk I tested the Link header injection scenario in redirect response (30X) Unfortunately, payment handler ignores it 🫤
0
0
1
@d4d89704243
d4d
25 days
RT @albinowax: Voting is now live for the Top Ten (New) Web Hacking Techniques of 2024! Browse the nominations & cast your votes here: http…
0
72
0
@d4d89704243
d4d
1 month
RT @albinowax: Nominations are now open for the Top 10 Web Hacking Techniques of 2024! Browse the contestants and submit your own here: htt…
0
89
0
@d4d89704243
d4d
1 month
RT @albinowax: I've just released HTTP Request Smuggler 2.17 which fixes a nasty Client-Side Desync false-negative. Big thanks to @t0xodile…
0
19
0
@d4d89704243
d4d
1 month
Reflecting on the year, here are some tools I’ve been building: 🚀 URL validation bypass cheat sheet 🔒Sign Saboteur Extension 🤖 Bypass bot detection Extension More to come in 2025! 🎄
0
18
63
@d4d89704243
d4d
2 months
Ruby secret_key_base can be decrypted from credentials.yml.enc file using following java code:
Tweet media one
1
0
3
@d4d89704243
d4d
2 months
Did you know you can use an ancient magic cookie to downgrade parsers and bypass WAFs?! Neither did we. Enjoy!
4
67
245
@d4d89704243
d4d
3 months
RT @albinowax: We’re finally live! You can now watch “Listen to the whispers: web timing attacks that actually work” on YouTube: https://t.…
0
99
0
@d4d89704243
d4d
3 months
You can bypass path-based WAF restrictions by appending raw/unencoded non-printable and extended-ASCII characters like \x09 (Spring), \xA0 (Express), and \x1C-1F (Flask):
Tweet media one
2
150
716