PentesterLab
@PentesterLab
Followers
196K
Following
12K
Media
295
Statuses
11K
We make learning web hacking and security easier. Online systems, code review, videos & courses that can be used to understand, test and exploit bugs!
Melbourne, Victoria
Joined December 2011
π₯πΉ 4 new Go Code Review Labs just dropped! πΉπ₯ Read the code, peek at the diff, find the bug. Sharpen your skills:
pentesterlab.com
The Golang Code Review Badge is our badge dedicated to code review in Golang. It covers the discovery of weaknesses and vulnerabilities using source code review.
3
10
70
Stay ready for outages with Powerwall and Storm Watch during extreme weather.
0
170
1K
Welcome back to Slytherin! π We just released 3 new labs in our python^w Slytherin code review badge: real CVEs, sneaky bugs, and plenty of chances to sharpen your dark code arts.. Grab your wand here:
pentesterlab.com
The Python Code Review Badge is our badge dedicated to code review in Python. It covers the discovery of weaknesses and vulnerabilities using source code review.
0
1
7
I just completed @Pentesterlab's PCAP badge!!!
1
1
7
I just completed @Pentesterlab's Unix Badge!!!
0
1
5
π§ How to Research & Reverse Web Vulnerabilities 101 One of my favourite hobbies (CVE analysis) is covered in this blog post from the ProjectDiscovery team:
projectdiscovery.io
Introduction This blog serves as a detailed methodology guide for analyzing, reversing, and researching web vulnerabilities, particularly those with CVEs assigned. The content outlines repeatable...
0
2
4
βοΈ Bypassing WAFs for Fun and JS Injection with Parameter Pollution A great summary of the current state of HTTP parameter pollution as a way to bypass WAFs:
blog.ethiack.com
Technical deep dive into bypassing a strict Web Application Firewall using HTTP Parameter Pollution, leveraging multi-parameter payload splitting to achieve JavaScript injection and evade detection.
1
1
2
Research Worth Reading Week 49/2025: WAF bypasses, CVE research & constant-time crypto. β° Introducing constant-time support for LLVM to protect cryptographic code Trail of Bits explains their work on adding constant-time support to LLVM so that compiled cryptographic code
blog.trailofbits.com
Trail of Bits developed constant-time coding support for LLVM that prevents compilers from breaking cryptographic implementations vulnerable to timing attacks, introducing the __builtin_ct_select...
2
2
5
Black Friday at @PentesterLab 𧨠For a limited time: π 1 year of PRO for $146.52 (instead of $199.99 / $239.88 if paid monthly) π Student special: 3 months PRO for $25.99 (instead of $34.99 / $59.97) Hands-on labs. Real CVEs. Security code review training used by real
4
19
117
I just completed @Pentesterlab's Golang Code Review Badge!!!
1
1
3