
Martin Doyhenard
@tincho_508
Security Researcher at PortSwigger. Speaker at BlackHat, DEF CON, RSA, Hack In The Box, Troopers, EkoParty
ID: 307063056
28-05-2011 23:36:10
227 Tweet
2,2K Followers
208 Following




Shoutout to Martin Doyhenard for the research! All this and more is in his @portswigger blog👇 portswigger.net/research/gotta…

I've just updated my "Screenshot" custom action with new features and hotkeys (thanks El Mago (backup)) To install it you can use Extensibility Helper, a new Burp extension that lets you import Bambdas directly from our GitHub repository with a single click! Go and get it!

Take Burp a step further and provide even more functionality than before with Custom Actions. Use Martin Doyhenard's new Bambda to take screenshots in Burp. You can also highlight and draw on your image to draw attention to specific areas. Check it out 👉 github.com/PortSwigger/ba…





“I kind of thought SQLi was a thing of the past” — Justin Gardner Turns out it’s alive and well. Still shows up at live hacking events. Sometimes deep. Sometimes not even that deep. Just waiting. Full talk → youtu.be/PXqlHAoF2wc #BugBounty #DEFCON #BBV #AppSec #WebSecurity







Now that our CTF is announced, we’re excited to welcome PortSwigger as our CTF Triage partner of the Bug Bounty Village CTF at DEF CON 33! Their support helps us build a space where hackers can connect, learn, and push boundaries. #BugBounty #DEFCON #BBV #BugBountyVillage

Don't miss "Surfing through the Stream: Advanced HTTP Desync exploitation in the wild" by Martin Doyhenard (Martin Doyhenard) on Saturday, August 9 at 01:00 PM inside the Village. Read more at bugbountydefcon.com/agenda #BugBounty #DEFCON33

Today at #BlackHatUSA - three major new releases from PortSwigger Research 1pm - 'HTTP Hacker' at Black Hat Arsenal with Martin Doyhenard 1pm - 'WebSocket Turbo Intruder' at Black Hat Arsenal with d4d 3.20m - 'HTTP/1.1 Must Die! The Desync Endgame' at Black Hat USA with
