irsdl Profile Banner
Soroush Dalili Profile
Soroush Dalili

@irsdl

Followers
20K
Following
11K
Media
878
Statuses
13K

Hacker (ethical), web appsec specialist, trainer, tools builder & apps breaker 🕸️https://t.co/YipuTcYnWc🥷 🍏A dad-joke maker🍐

Worcestershire, England
Joined August 2009
Don't wanna be here? Send us removal request.
@pyn3rd
pyn3rd
2 days
#CVE-2025-55182 React4Shell — How about Akamai WAF? Even more straightforward: toss a giant junk blob upfront and the parser taps out on sight. Bloody brute force. Go verify it on your own endpoint—again and again. Figure 1: shows the payload validity check. Figure 2:
7
48
312
@maple3142
maple3142
4 days
A POC for CVE-2025-55182 https://t.co/BcyJ1UbivA
34
419
2K
@VISITFLORIDA
VISIT FLORIDA
28 days
Stir up the group chat with a "let’s go to Florida this weekend 😎”
0
7
172
@irsdl
Soroush Dalili
5 days
I had a great time at @NDC_Conferences in Manchester thanks to its organisers. I am especially glad that I managed to meet and talk to some good folks in the dev and security communities 👍
0
0
5
@cyb3rops
Florian Roth ⚡️
5 days
Critical Security Vulnerability in React Server Components CVE-2025-55182 and rated CVSS 10.0 The vulnerability is present in versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of: react-server-dom-webpack react-server-dom-parcel react-server-dom-turbopack https://t.co/AMlp6yMPSZ
17
130
550
@h4x0r_dz
H4x0r.DZ 🇰🇵
5 days
CVE-2025-55182 RCE in React Server Components 💀 https://t.co/tKKyd9WljA
9
61
496
@garethheyes
Gareth Heyes \u2028
6 days
Power users use Hackvertor tags to make exploitation much easier!
@irsdl
Soroush Dalili
6 days
Here is the screenshot of how it can be used inside Burp Suite using the @hackvertor extension
2
1
44
@irsdl
Soroush Dalili
6 days
Here is the screenshot of how it can be used inside Burp Suite using the @hackvertor extension
0
4
20
@irsdl
Soroush Dalili
6 days
Since we're covering this tomorrow at @NDC_Conferences Manchester, I’ve released the bypass for the ToolShell SharePoint deserialization exploit in https://t.co/9BofGcFaWh (same bug @_l0gg originally showed). “Complex” bypass? 🥵 Just a single whitespace. 👻 Something we even
Tweet card summary image
github.com
Deserialization payload generator for a variety of .NET formatters - irsdl/ysonet
1
19
97
@garethheyes
Gareth Heyes \u2028
7 days
On Thursday I'm presenting "Splitting the email atom:exploiting parsers to bypass access controls" at NDC Manchester. Please join me if you want to find out how to turn an RFC compliant email address into RCE. https://t.co/ry7V3zfjqa
Tweet card summary image
portswigger.net
0
6
67
@irsdl
Soroush Dalili
9 days
Interesting list, @secdim also has a good offer!
@_r_netsec
/r/netsec
10 days
InfoSec Black Friday Dealz 2025
1
0
7
@Dinosn
Nicolas Krassas
9 days
Leak confirms OpenAI is preparing ads on ChatGPT for public roll out
Tweet card summary image
bleepingcomputer.com
OpenAI is now internally testing 'ads' inside ChatGPT that could redefine the web economy.
0
4
6
@0xacb
André Baptista
12 days
If you need to generate a target-specific wordlist, make sure to check out @xnl_h4ck3r GAP extension. It will scan for sus parameters and generate you a complete wordlist with one click of a button. See it in action 👇
2
43
292
@irsdl
Soroush Dalili
12 days
Math question, how much is the tax rate between 100-125k in the UK? Obvious question, why do they make it like this instead of stating the obvious? Don't use AI! #Tax #UK
1
0
3
@_l0gg
Khoa Dinh
19 days
Exploit for ToolShell. Modified ysoserial for crafting DataTable payload. https://t.co/1zJMDbGker
Tweet card summary image
github.com
Exploit for ToolShell. Contribute to l0ggg/ToolShell development by creating an account on GitHub.
3
25
82
@irsdl
Soroush Dalili
20 days
The https://t.co/OpFfwtJCLm post by @xoreipeip shows how prepared statements can be exploited in NodeJS using mysql and mysql2 packages leading to SQLi! 🪄 So use of prepared statement might not be the ultimate solution here 🥵 as a side note, @xoreipeip later found this
4
29
141
@catc0n
Caitlin Condon
24 days
Active FortiWeb exploitation has been well-covered already by @DefusedCyber, @CERTCyberdef, @watchtowrcyber, @cyb3rops, and more. But the big question is why on earth CVE-2025-64446 was silently patched to begin with.
Tweet card summary image
vulncheck.com
Vulnerability intelligence that predicts avenues of attack with speed and accuracy.
1
8
33