sebsrt
@s3bsrt
Followers
557
Following
1K
Media
4
Statuses
33
I like to break stuff | Red Team Operator & web CTF player @ARESxCTF @aboutblankets
Italy
Joined February 2022
I’ve been digging into HTTP Trailers and found some new smuggling techniques: https://t.co/gpaIiYkSHs
sebsrt.xyz
Trailing Danger: exploring HTTP Trailer parsing discrepancies
4
102
401
See you in Japan!
🔥SECCON CTF 14 International Finalists🔥 Intrnational Final round: Feb 28-Mar 1, 2026 (JST). See image for finalists. We look forward to welcoming all the teams in person. See you in Japan!🇯🇵 #SECCON
1
0
16
Hello! We’ve just launched a new wargame site called damn vulnerable web! It consists only of web challenges, primarily designed for intermediate to advanced players rather than beginners. We hope this wargame helps more people gain deeper and broader knowledge in web hacking
6
95
535
TR.MRG HTTP Request Smuggling? author writeup for Trailing Danger - m0lecon 2026 teaser CTF 👉 https://t.co/1VdPNURFMH I'll share more about trailer fields parsing vulnerabilities soon.
6
40
198
The watchTowr Labs team is back, providing our full analysis of the Oracle E-Business Suite Pre-Auth RCE exploit chain (CVE-2025-61882). Enjoy with us (or cry, your choice..) https://t.co/ffDKb723N6
labs.watchtowr.com
We bet you thought you’d be allowed to sit there, breathe, and savour the few moments of peace you’d earned after a painful week in cyber security. Obviously, you were horribly wrong, and you need to...
5
137
383
I found that python hyper-h2 didn't correctly validate headers allowing http2 request splitting via crlf injection on http1 downgrades. So any proxy that uses it (like mitmproxy) might be vulnerable.
2
5
44
CVE-2025-8671: HTTP/2 implementations are vulnerable to "MadeYouReset" DoS attack through HTTP/2 control frames
1
4
8
Interesting one :)
Just found an interesting way to bypass some nonce-based CSPs and made a small XSS challenge with an exploitable scenario. See if you can find it before I tell! Source JS: https://t.co/UpbVzHoHiv URL: https://t.co/cuKHD3oCQB Found a solution? Please DM to avoid spoilers, thanks!
0
0
8
I have just updated my site, here's the writeup of cve-2024-48962 I found in Apache Ofbiz. https://t.co/dxW9qaMFgi
sebsrt.xyz
A detailed analysis of CVE-2024-48962, a Server-Side Template Injection (SSTI) vulnerability in Apache OFBiz, and how it can be exploited to achieve Remote Code Execution (RCE).
0
0
4
Here's my research about Python dirty Arbitrary File Write to RCE via overwriting shared object files or overwriting bytecode files. Enjoy! https://t.co/P3V2y0yGH9
#Research #WebAppSec
siunam321.github.io
In Python, if dirty Arbitrary File Write (AFW) vulnerability exists in the application, it is possible to gain RCE via writing shared object files or overwriting bytecode files. It can be very...
0
54
192
📚 You can find all of the community writeups on our gitbook, including @frevadiscor89, @b0ffm4n, @s3bsrt, @system_LFE and @kabilan1290 💜 https://t.co/cFYpjauxiH
bugology.intigriti.io
Writeup for the Intigriti January 2025 challenge 💥
0
6
9
Our third winner is @s3bsrt! 🎊 Straight to the point but all the key elements are in there. Good one if you are in a hurry 👀 Read it here 👇 https://t.co/bjD34kCs8x
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
1
1
5