t0xodile Profile Banner
Thomas Stacey Profile
Thomas Stacey

@t0xodile

Followers
668
Following
2K
Media
5
Statuses
462

Penetration tester trying to perform novel research. You can find all of my write-ups and research at https://t.co/2chUIHJDeP.

Gothenburg, Sweden
Joined June 2014
Don't wanna be here? Send us removal request.
@t0xodile
Thomas Stacey
7 months
Thrilled to finally release my latest research "The Single-Packet Shovel: Digging for Desync-Powered Request Tunnelling". Desync vulnerabilities stemming from HP2 downgrading continue to plague even the largest vendors, have a read to find out more! https://t.co/Elsr3WEYXZ
assured.se
In this paper I will reveal the discovery of wide-spread cases of request tunnelling in applications powered by popular servers including IIS, Azure Front Door and AWS' application load balancer...
3
46
142
@BlackHatEvents
Black Hat
14 hours
🤔 Got questions about Black Hat? Join the "Ask Me Anything: Meet the Black Hat Review Board" session at #BHEU! Engage directly with the experts shaping the event and get your burning questions answered. Learn more here >> https://t.co/2aqB6xCjMp
0
1
2
@BlackHatEvents
Black Hat
16 hours
At #BHEU, Zak Fedotkin unveils "The Fragile Lock" — groundbreaking bypasses that challenge the integrity of SAML authentication. Learn how attackers exploit weaknesses and what it means for security. 🔑 Don't miss it! Register now >> https://t.co/m0P5QWsuzN
0
3
8
@BSidesExeter
BSides Exeter
19 hours
Where is the time going? Not long to BSides London too! The elves have been busy chatting to partners, potential sponsors and very keen speakers. Plenty of time to get involved, give us a shout. #oooarrcyber
0
2
1
@rebane2001
Rebane
2 days
my new blogpost is out!! this one talks about a new web vulnerability class i discovered that allows for complex interactive cross-origin attacks and data exfiltration and i've already used it to get a google docs bounty ^^ have fun <3 https://t.co/PBct6aB24W
lyra.horse
A novel and powerful twist on an old classic.
18
65
393
@garethheyes
Gareth Heyes \u2028
1 day
Delighted to present at NDC Manchester. If you attended the talk and want the materials you can grab them from here: https://t.co/kysqoXs1fZ
Tweet card summary image
github.com
Contribute to PortSwigger/splitting-the-email-atom development by creating an account on GitHub.
0
4
22
@jinonehk
Jinone
3 days
Great experience collaborating with Akamai — the team is incredibly friendly and professional.
@ryancbarnett
Ryan Barnett (B0N3)
3 days
CVE-2025-66373: HTTP Request Smuggling Due to Invalid Chunked Body Size https://t.co/uviWpvUJBA
1
2
18
@albinowax
James Kettle
3 days
Next week I'll be on a #BHEU panel alongside review board members Enno Rey, Marina Krotofil & Marion Marschalek! If you're an aspiring researcher, this is a chance to grill us on what it takes to land a conference slot & deliver an unforgettable presentation @BlackHatEvents
1
5
31
@PortSwigger
PortSwigger
5 days
We pride ourselves on our incredible team of world-class security researchers. There's a good chance that you've seen some of our research, but not all of it. HTTP desync, URL validation bypasses, web cache tricks, cookie chaos, CSS exfil... all the good stuff! Have a quick
Tweet card summary image
portswigger.net
0
10
76
@garethheyes
Gareth Heyes \u2028
5 days
On Thursday I'm presenting "Splitting the email atom:exploiting parsers to bypass access controls" at NDC Manchester. Please join me if you want to find out how to turn an RFC compliant email address into RCE. https://t.co/ry7V3zfjqa
Tweet card summary image
portswigger.net
0
6
67
@nowaskyjr
Nowasky
8 days
The content of a <script> inside <math> or <svg> is treated as text. If the browser hits an HTML tag they can't handle, like <img>, it closes them and places the tag outside. What looks like commented-out JS isn't. https://t.co/O0ZsVMUT00 #xss
1
20
129
@BSidesExeter
BSides Exeter
10 days
We’re exploring what truly drives people into cybersecurity. celebrating the explorers, the questioners, and the quietly determined minds. We know that not everyone came to cyber through coding or gaming. #oooarrcyber
0
3
3
@BourAbdelhadi
Bour Abdelhadi
12 days
Hey everyone! I’ve been building rep+, a lightweight HTTP Repeater inside Chrome DevTools. No proxy setup or certificates. Just open DevTools and start poking requests. It also has built-in AI for explanations and attack ideas. I’ll share one rep+ feature every day. Try it 👇
43
157
883
@BSidesExeter
BSides Exeter
12 days
💚 Events like BSides Exeter don’t happen without our incredible sponsors. Your support keeps tickets affordable, gives new voices a platform, and helps us celebrate this year’s theme — “Curiosity Made the Cyber Pro.” 👉 https://t.co/O0566Y8ZiM #oooarrrcyber
0
7
7
@BSidesExeter
BSides Exeter
15 days
CURIOSITY BUILT THE CYBER PRO Every cyber security and digital forensics professional started the same way — curious, determined, and probably told to “get off that computer!” or “you’ve been online too long!” #oooarrcyber
0
2
2
@t0xodile
Thomas Stacey
16 days
This is both hilarious and an educational read!
@Hxzeroone
Hx01
16 days
Hello! Just published a new research with ( @sml555_ , @codecancare) 🍻 Who Needs A Blind XSS? https://t.co/bUpFj1p0Mh #CyberSecurity #BugBounty
0
0
0
@t0xodile
Thomas Stacey
16 days
We have a copy at the office now. Just get it, it's great!
@garethheyes
Gareth Heyes \u2028
16 days
HackFriday starts now JavaScript for Hackers is on sale for $13.37 and the deal runs past Hack Friday Boost your payload skills and sharpen your hacking game Grab it while it lasts 🔥 https://t.co/84e3xYGQu4
0
0
3
@garethheyes
Gareth Heyes \u2028
16 days
HackFriday starts now JavaScript for Hackers is on sale for $13.37 and the deal runs past Hack Friday Boost your payload skills and sharpen your hacking game Grab it while it lasts 🔥 https://t.co/84e3xYGQu4
Tweet card summary image
amazon.com
2
8
40
@Burp_Suite
Burp Suite
18 days
"Burp AI can bring up a new generation of hackers faster and more effectively.​​​​​​" In his new article, @hAPI_hacker explores how Burp AI: 🔬 Analyzes requests and adapts when attacks fail. 💬 Explains findings in clear language. 💪 Enhances human decision-making. 👉
Tweet card summary image
portswigger.net
AI isn’t just reshaping cybersecurity - it’s challenging testers to rethink their entire playbook. In his latest article, “Hacking with Burp AI in the Chesspocalypse”, API expert Corey Ball draws less
1
7
47
@albinowax
James Kettle
22 days
Want to experiment with Anomaly Rank on arbitrary requests anywhere inside Burp Suite? Nick Coblentz made an extension for that! Try it out here:
Tweet card summary image
github.com
Contribute to ncoblentz/BurpExtensionAnomalyRankContextMenu development by creating an account on GitHub.
@albinowax
James Kettle
25 days
I've just upgraded Turbo Intruder with a shiny new algorithm called HTTP Anomaly Rank, which automatically finds the most unusual responses in your attack! Here's a quick demo, full details in the writeup below:
0
6
46