Soroush Dalili
@irsdl
Followers
20K
Following
11K
Media
878
Statuses
13K
Hacker (ethical), web appsec specialist, trainer, tools builder & apps breaker 🕸️https://t.co/YipuTcYnWc🥷 🍏A dad-joke maker🍐
Worcestershire, England
Joined August 2009
Stir up the group chat with a "let’s go to Florida this weekend 😎”
0
7
172
I had a great time at @NDC_Conferences in Manchester thanks to its organisers. I am especially glad that I managed to meet and talk to some good folks in the dev and security communities 👍
0
0
5
Microsoft Silently Mitigated Exploited LNK Vulnerability
securityweek.com
Windows now displays in the properties tab of LNK files critical information that could reveal malicious code.
0
3
9
Critical Security Vulnerability in React Server Components CVE-2025-55182 and rated CVSS 10.0 The vulnerability is present in versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of: react-server-dom-webpack react-server-dom-parcel react-server-dom-turbopack https://t.co/AMlp6yMPSZ
17
130
550
Power users use Hackvertor tags to make exploitation much easier!
2
1
44
Glassworm malware returns in third wave of malicious VS Code packages
bleepingcomputer.com
The Glassworm campaign, which first emerged on the OpenVSX and Microsoft Visual Studio marketplaces in October, is now in its third wave, with 24 new packages added on the two platforms.
0
7
12
Here is the screenshot of how it can be used inside Burp Suite using the @hackvertor extension
0
4
20
Since we're covering this tomorrow at @NDC_Conferences Manchester, I’ve released the bypass for the ToolShell SharePoint deserialization exploit in https://t.co/9BofGcFaWh (same bug @_l0gg originally showed). “Complex” bypass? 🥵 Just a single whitespace. 👻 Something we even
github.com
Deserialization payload generator for a variety of .NET formatters - irsdl/ysonet
1
19
97
On Thursday I'm presenting "Splitting the email atom:exploiting parsers to bypass access controls" at NDC Manchester. Please join me if you want to find out how to turn an RFC compliant email address into RCE. https://t.co/ry7V3zfjqa
portswigger.net
0
6
67
Leak confirms OpenAI is preparing ads on ChatGPT for public roll out
bleepingcomputer.com
OpenAI is now internally testing 'ads' inside ChatGPT that could redefine the web economy.
0
4
6
If you need to generate a target-specific wordlist, make sure to check out @xnl_h4ck3r GAP extension. It will scan for sus parameters and generate you a complete wordlist with one click of a button. See it in action 👇
2
43
292
Exploit for ToolShell. Modified ysoserial for crafting DataTable payload. https://t.co/1zJMDbGker
github.com
Exploit for ToolShell. Contribute to l0ggg/ToolShell development by creating an account on GitHub.
3
25
82
The https://t.co/OpFfwtJCLm post by @xoreipeip shows how prepared statements can be exploited in NodeJS using mysql and mysql2 packages leading to SQLi! 🪄 So use of prepared statement might not be the ultimate solution here 🥵 as a side note, @xoreipeip later found this
4
29
141
Active FortiWeb exploitation has been well-covered already by @DefusedCyber, @CERTCyberdef, @watchtowrcyber, @cyb3rops, and more. But the big question is why on earth CVE-2025-64446 was silently patched to begin with.
vulncheck.com
Vulnerability intelligence that predicts avenues of attack with speed and accuracy.
1
8
33