Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile
Gareth Heyes \u2028

@garethheyes

JavaScript for hackers: Learn to think like a hacker. amazon.com/JavaScript-hac…

ID: 16879627

linkhttps://garethheyes.co.uk/#latestBook calendar_today21-10-2008 02:23:43

16,16K Tweet

35,35K Followers

1,1K Following

PortSwigger (@portswigger) 's Twitter Profile Photo

Talk 1 – Gareth Heyes \u2028 “Amplify the Hacker” explores AI-powered Burp extensions, empowering you to: 🔁 Automate the repetitive bits of testing. 👨‍💻 See live demos of Gareth’s AI-Hackvertor, Shadow Repeater, and Document My Pentest. ⚙️Build and ship your own Burp AI extensions in

PortSwigger (@portswigger) 's Twitter Profile Photo

Talk 2 – d4d “Cookie Chaos” shows how small parser gaps in RFCs lead to big security problems. You’ll leave with: 🛫A fun and unique case study of how Zack found this exploit. 🍪Proven methods to test for cookie parsing exploits. 🧰 A toolkit with ready-made BApps and

d4d (@d4d89704243) 's Twitter Profile Photo

Chrome lies. Safari lies. No single RFC covers all the flaws in cookies parsing. Don’t miss my talk “Cookie Chaos: Exploiting Parser Discrepancies” at SteelCon track 2 at 16:30-17:30

Derin Eryilmaz (@deryilz) 's Twitter Profile Photo

🔥Blog post is up! How extensions could exploit JS bindings to use webRequestBlocking prior to Chrome 118: 0x44.xyz/blog/web-reque…

Lord Steak (@adrian__t) 's Twitter Profile Photo

This weekend I attended SteelCon for the first time — and all I can say is, what a great conference! Here are some of the talks I attended and really enjoyed: IsThatFinux? – "Slide or Get Slid On: Surviving Cyber Threats Drill Style (Even Woody would be shocked)" I was

0x999 🇮🇱 (@_0x999) 's Twitter Profile Photo

New blog post is up: How I leaked the IP addresses of Brave's Tor window and Chrome VPN extension users--plus, a new Popunder technique and connect-src CSP directive bypass. Read more @ 0x999.net/blog/leaking-i…

Masato Kinugawa (@kinugawamasato) 's Twitter Profile Photo

<meta http-equiv="refresh" content="0;url='//example.com'@x.com/'"> Chrome redirects to x.com, Safari and Firefox redirect to example.com.

Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

You can use big int after any number including octals, hex and binary. Oh JS I love your quirky nature ❤️. Might help bypass a flawed WAF regex.

You can use big int after any number including octals, hex and binary. Oh JS I love your quirky nature ❤️. Might help bypass a flawed WAF regex.