Paul
unashamedgeek.bsky.social
Paul
@unashamedgeek.bsky.social
Reposted by Paul
Bypass CSP in a single click using my new Custom Action, powered by @renniepak.nl's excellent CSP bypass project.
December 16, 2025 at 3:31 PM
Reposted by Paul
If you need to generate a target-specific wordlist, make sure to check out @xnl_h4ck3r GAP extension.

It will scan for sus parameters and generate you a complete wordlist with one click of a button. See it in action 👇
November 26, 2025 at 4:04 PM
Reposted by Paul
I let Burp AI loose against a couple more web challenges over on Portswigger Web Academy: SSRF & SSTI

Watch how it does: youtu.be/eQBD2-k9V7s
November 19, 2025 at 3:01 PM
Reposted by Paul
Long overdue, but I rewrote Logger++ to be more memory efficient and fix all the bugs!

github.com/CoreyD97/Ins...
Release Initial Release! · CoreyD97/InsiKt
Logger++ is dead, long live InsiKt! It has been a long time since I first adopted Logger++ from @irsdl back in 2017. Since then I have left NCC Group and no longer have access to the repository, so...
github.com
November 8, 2025 at 7:44 PM
Reposted by Paul
Now live on tools.honoki.net/smuggler.html

Let me know what you think! ✨
July 22, 2025 at 1:38 PM
Reposted by Paul
I recently switched from Pocket to Wallabag. My notes could be helpful if you consider a similar migration....

gitlab.com/-/snippets/4...
Migrating from Pocket to Wallabag ($4871013) · Snippets · GitLab
GitLab.com
gitlab.com
July 10, 2025 at 8:31 AM
Reposted by Paul
The upcoming "HTTP/1 must die" WebSecAcademy lab is no longer impossible! This is good news because I'm planning to attempt to live-stream solving it...
June 20, 2025 at 12:52 PM
Love this, been there too many times.
Biggest commitment to a 3 second joke I've ever seen
April 9, 2025 at 12:19 PM
Reposted by Paul
TIL about rlwrap, which is a very convenient wrapper around readline that you can combine with "dumb" commands like netcat 🎁

For example, in order to run netcat with command-line editing, simply execute "rlwrap nc localhost 80". Easy, isn't it?

github.com/hanslub42/rl...
GitHub - hanslub42/rlwrap: A readline wrapper
A readline wrapper. Contribute to hanslub42/rlwrap development by creating an account on GitHub.
github.com
April 6, 2025 at 1:38 PM
Reposted by Paul
The 9.1 CVSS CVE-2025-29927 authentication bypass vulnerability in Next.js middleware -- covered in a rambling video and teeny tiny demo showcase,
✨ V I B E C O D I N G✨ a vulnerable proof-of-concept app. youtu.be/dL1a0KcAW3Y
March 24, 2025 at 1:00 PM
Reposted by Paul
In case you missed them, here are all the videos to highlight some of Hackvertor v2 features.

www.youtube.com/watch?v=RV0L...
Hackvertor V2 Pro Tips
YouTube video by gazheyes
www.youtube.com
February 25, 2025 at 12:47 PM
Reposted by Paul
We've just released Shadow Repeater, for AI-enhanced manual testing. Simply use Burp Repeater as you normally would, and behind the scenes Shadow Repeater will learn from your attacks, try payload permutations, and report any discoveries via Organizer.

portswigger.net/research/sha...
February 20, 2025 at 1:24 PM
Reposted by Paul
@jameskettle.com casually dropping info on the craziest sounding AI-enabled burp extension. Can you imagine messing about with a suspicious LFI candidate in repeater and without you doing anything differently than you do today, burp suddenly spits back the right payload?
Top 10 Web Hacking Techniques of 2024 - James Kettle - ASW #318
YouTube video by Security Weekly - A CRA Resource
youtu.be
February 18, 2025 at 3:37 PM
Reposted by Paul
If you'd like to practice your Hackvertor skills, here are two Web Security Academy challenges you should take up 🛠️

1️⃣ Inconsistent handling of exceptional input
portswigger.net/web-security...

2️⃣ Providing an encryption oracle
portswigger.net/web-security...
February 17, 2025 at 4:13 PM
Reposted by Paul
Found a handy new CSP bypass gadget on Snapchat:

cspbypass.com#snapchat
February 13, 2025 at 8:54 AM
Reposted by Paul
Thanks to everyone who took the O4D training, played my CTF, and attended my workshop at @wildwesthackinfest.bsky.social

I'm exhausted, but I saw enough smiles from folks that it made it all worth it.

See you all next time 😁
February 8, 2025 at 6:33 PM
Reposted by Paul
Discover blocklist bypasses via unicode overflows using the latest updates to ActiveScan++, Hackvertor & Shazzer! Thanks to Ryan Barnett and Neh Patel for sharing this technique.

portswigger.net/research/byp...
January 28, 2025 at 2:01 PM
Reposted by Paul
There's a certain 'harmless' quirk in a popular server that I've known about for over ten years but never found or seen a viable use for. Today, I used it to complete an exploit chain! I feel like I just solved the meaning of life 😂
January 27, 2025 at 3:52 PM
Reposted by Paul
A nice tip Match & Replace from Intigriti... 💎

Replace `Content-Type: application/json` with `Content-Type: application/xml` in requests and look for XML parsing errors in responses 🛠️

That will allow you to identify XML-processing endpoints 🧠
January 3, 2025 at 8:48 AM
Reposted by Paul
Nominations are now open for the Top 10 Web Hacking Techniques of 2024! Browse the contestants and submit your own here:
portswigger.net/research/top...
Top ten web hacking techniques of 2024: nominations open
Nominations are now open for the top 10 new web hacking techniques of 2024! Every year, security researchers from all over the world share their latest findings via blog posts, presentations, PoCs, an
portswigger.net
January 8, 2025 at 2:09 PM
Reposted by Paul
Hackvertor now supports tags `<@space/>` and `<@newline/>`

That doesn't look like a game-changer, but it's incredibly useful when you want to avoid that these raw characters break Burp's HTTP parsing
January 5, 2025 at 1:22 PM
Reposted by Paul
Also cool is, that Wireshark directly allows you to start an application with this environment variable set. So you can launch a browser from within Wireshark and directly decrypt and analyze the TLS traffic. 😃👌
December 24, 2024 at 11:06 AM
Reposted by Paul
Given that simps0n isn’t on Bluesky, allow me to repost a link to his excellent weekly ezine 💎

Here’s today’s edition, "AppSec Ezine - 566th" 📚
AppSec Ezine
pathonproject.com
December 20, 2024 at 4:28 PM
Reposted by Paul
⚠️Challenge time again⚠️

It is based on a real-world situation. Use the HTML injection to leak the flag to an external domain ☃️

This time, send solutions in DM; we don't want to spoil the fun. I also might want to patch any obvious blunder I made creating it

joaxcar.com/xss/outer.ht...
December 18, 2024 at 2:04 PM