
Soroush Dalili
@irsdl
Followers
20K
Following
11K
Media
865
Statuses
13K
Hacker (ethical), web appsec specialist, trainer, tools builder & apps breaker, @SecProjectLtd founder 🕸️https://t.co/YipuTcYnWc🥷 🍏A dad-joke maker🍐
Worcestershire, England
Joined August 2009
As they fixed this blog post, for anyone missing this, you can see @buffaloverflow 's art here: .
1
0
4
Visiting NCC Group’s blogs right now feels like a CTF challenge: decipher the mangled text while dodging XSS pop-ups. Better to use web archive to see the original content but they have even changed the URLs!.Example: .The etc are
6
20
131
RT @IranOpenData: Iran may now power 15% of the world’s crypto mining. 2,400 MW lost in July = 3.5–4% of national power. 15 TWh/year = 8….
0
9
0
Due to the lack of interest, unfortunately this #BurpSuite tutorial is not going to happen now. I may do it in the future.
0
0
2
Thinking of making a short video on how I use #BurpSuite + PwnFox 🦊 to load different tokens/sessions with ActionScript. Might also mix in Macros (if scripts allow). If this sounds useful, 200+ likes and I’ll record it 😇.
In a specific scenario, I needed to automatically update the Authorization header in Burp Repeater with the latest successful OAuth response captured in the Proxy tab. I used this Action Script: Hopefully, the idea will be useful for others as well.
8
26
148
In a specific scenario, I needed to automatically update the Authorization header in Burp Repeater with the latest successful OAuth response captured in the Proxy tab. I used this Action Script: Hopefully, the idea will be useful for others as well.
1
1
43
RT @Dinosn: Git vulnerability leading to RCE is being exploited by attackers (CVE-2025-48384)
helpnetsecurity.com
CVE-2025-48384, a recently patched vulnerability in the popular distributed revision control system Git, is being exploited by attackers.
0
21
0
RT @garethheyes: I discovered how to use CSS to steal attribute data without selectors and stylesheet imports! This means you can now explo….
0
86
0
RT @DefusedCyber: Mass exploitation of CVE-2025-25257 from 196.75.238.72 🇲🇦 (FortiWeb critical pre-auth SQL injection) . VT Detections: 0/….
0
98
0
RT @Dinosn: FortMajeure: Authentication Bypass in FortiWeb (CVE-2025-52970)
pwner.gg
Hello world! long time no see. I was so busy, mainly with working on symbol.exchange (btw opened a new “Bug Driven Development” community) and started to try my way in academia.
0
4
0
RT @ctbbpodcast: New episode is out! - In this episode Justin sits down with @ryancbarnett for a deep dive on WAFs….
0
15
0
If I hire all great bug bounty folks to work using 1 account, my score would have been more than double!. If I then convince @galnagli to use automation on all h1 programs while working for me then my score would be through the roof! . Yeah, take that AI, only if I had that much.
If I used my automation on all HackerOne programs, my score would have been double that of the AI Hackbots….
1
0
21
This blog post by @CryptoGangsta explains How Burp AI Works at the moment (from user's perspective)! .If you are interested in this topic, definitely give this a read. We should have room to anonymize data etc. as well but it might just be easier for the time being to do the AI.
@irsdl Wrote the blog post. This should have info to redirect Burp AI to your own instance.
0
0
3
RT @WebSecAcademy: How to manually check for CL.TE Request Smuggling Vulnerabilities:. 1️⃣ See if a GET request accepts POST.2️⃣ See if it….
0
111
0
RT @ryanaraine: On the pod, I asked Brandon Dixon (RiskIQ/Microsoft) about AI security things rising above the hype. @juanandres_gs https:/….
0
5
0