s3bsrt Profile Banner
sebsrt Profile
sebsrt

@s3bsrt

Followers
557
Following
1K
Media
4
Statuses
33

I like to break stuff | Red Team Operator & web CTF player @ARESxCTF @aboutblankets

Italy
Joined February 2022
Don't wanna be here? Send us removal request.
@s3bsrt
sebsrt
10 days
I’ve been digging into HTTP Trailers and found some new smuggling techniques: https://t.co/gpaIiYkSHs
sebsrt.xyz
Trailing Danger: exploring HTTP Trailer parsing discrepancies
4
102
401
@s3bsrt
sebsrt
5 days
See you in Japan!
@secconctf
SECCON
6 days
🔥SECCON CTF 14 International Finalists🔥 Intrnational Final round: Feb 28-Mar 1, 2026 (JST). See image for finalists. We look forward to welcoming all the teams in person. See you in Japan!🇯🇵 #SECCON
1
0
16
@RewriteLab
RewriteLab
22 days
Hello! We’ve just launched a new wargame site called damn vulnerable web! It consists only of web challenges, primarily designed for intermediate to advanced players rather than beginners. We hope this wargame helps more people gain deeper and broader knowledge in web hacking
6
95
535
@s3bsrt
sebsrt
4 months
TR.MRG HTTP Request Smuggling? author writeup for Trailing Danger - m0lecon 2026 teaser CTF 👉 https://t.co/1VdPNURFMH I'll share more about trailer fields parsing vulnerabilities soon.
6
40
198
@watchtowrcyber
watchTowr
5 months
The watchTowr Labs team is back, providing our full analysis of the Oracle E-Business Suite Pre-Auth RCE exploit chain (CVE-2025-61882). Enjoy with us (or cry, your choice..) https://t.co/ffDKb723N6
Tweet card summary image
labs.watchtowr.com
We bet you thought you’d be allowed to sit there, breathe, and savour the few moments of peace you’d earned after a painful week in cyber security. Obviously, you were horribly wrong, and you need to...
5
137
383
@s3bsrt
sebsrt
6 months
I found that python hyper-h2 didn't correctly validate headers allowing http2 request splitting via crlf injection on http1 downgrades. So any proxy that uses it (like mitmproxy) might be vulnerable.
2
5
44
@oss_security
Open Source Security mailing list
6 months
CVE-2025-8671: HTTP/2 implementations are vulnerable to "MadeYouReset" DoS attack through HTTP/2 control frames
1
4
8
@s3bsrt
sebsrt
8 months
Interesting one :)
@J0R1AN
Jorian
8 months
Just found an interesting way to bypass some nonce-based CSPs and made a small XSS challenge with an exploitable scenario. See if you can find it before I tell! Source JS: https://t.co/UpbVzHoHiv URL: https://t.co/cuKHD3oCQB Found a solution? Please DM to avoid spoilers, thanks!
0
0
8
@emil_lerner
Emil Lerner
11 months
The recording is uploaded)
3
17
64
@intigriti
Intigriti
11 months
🩸 First blood went to @s3bsrt in under 15 mins 👏
0
1
13
@s3bsrt
sebsrt
11 months
0
0
0
@intigriti
Intigriti
1 year
📚 You can find all of the community writeups on our gitbook, including @frevadiscor89, @b0ffm4n, @s3bsrt, @system_LFE and @kabilan1290 💜 https://t.co/cFYpjauxiH
Tweet card summary image
bugology.intigriti.io
Writeup for the Intigriti January 2025 challenge 💥
0
6
9
@intigriti
Intigriti
1 year
Our third winner is @s3bsrt! 🎊 Straight to the point but all the key elements are in there. Good one if you are in a hurry 👀 Read it here 👇 https://t.co/bjD34kCs8x
Tweet card summary image
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
1
1
5