Thomas Stacey
@t0xodile
Followers
668
Following
2K
Media
5
Statuses
462
Penetration tester trying to perform novel research. You can find all of my write-ups and research at https://t.co/2chUIHJDeP.
Gothenburg, Sweden
Joined June 2014
Thrilled to finally release my latest research "The Single-Packet Shovel: Digging for Desync-Powered Request Tunnelling". Desync vulnerabilities stemming from HP2 downgrading continue to plague even the largest vendors, have a read to find out more! https://t.co/Elsr3WEYXZ
assured.se
In this paper I will reveal the discovery of wide-spread cases of request tunnelling in applications powered by popular servers including IIS, Azure Front Door and AWS' application load balancer...
3
46
142
🤔 Got questions about Black Hat? Join the "Ask Me Anything: Meet the Black Hat Review Board" session at #BHEU! Engage directly with the experts shaping the event and get your burning questions answered. Learn more here >> https://t.co/2aqB6xCjMp
0
1
2
At #BHEU, Zak Fedotkin unveils "The Fragile Lock" — groundbreaking bypasses that challenge the integrity of SAML authentication. Learn how attackers exploit weaknesses and what it means for security. 🔑 Don't miss it! Register now >> https://t.co/m0P5QWsuzN
0
3
8
Where is the time going? Not long to BSides London too! The elves have been busy chatting to partners, potential sponsors and very keen speakers. Plenty of time to get involved, give us a shout. #oooarrcyber
0
2
1
my new blogpost is out!! this one talks about a new web vulnerability class i discovered that allows for complex interactive cross-origin attacks and data exfiltration and i've already used it to get a google docs bounty ^^ have fun <3 https://t.co/PBct6aB24W
lyra.horse
A novel and powerful twist on an old classic.
18
65
393
Delighted to present at NDC Manchester. If you attended the talk and want the materials you can grab them from here: https://t.co/kysqoXs1fZ
github.com
Contribute to PortSwigger/splitting-the-email-atom development by creating an account on GitHub.
0
4
22
Great experience collaborating with Akamai — the team is incredibly friendly and professional.
CVE-2025-66373: HTTP Request Smuggling Due to Invalid Chunked Body Size https://t.co/uviWpvUJBA
1
2
18
Next week I'll be on a #BHEU panel alongside review board members Enno Rey, Marina Krotofil & Marion Marschalek! If you're an aspiring researcher, this is a chance to grill us on what it takes to land a conference slot & deliver an unforgettable presentation @BlackHatEvents
1
5
31
We pride ourselves on our incredible team of world-class security researchers. There's a good chance that you've seen some of our research, but not all of it. HTTP desync, URL validation bypasses, web cache tricks, cookie chaos, CSS exfil... all the good stuff! Have a quick
portswigger.net
0
10
76
On Thursday I'm presenting "Splitting the email atom:exploiting parsers to bypass access controls" at NDC Manchester. Please join me if you want to find out how to turn an RFC compliant email address into RCE. https://t.co/ry7V3zfjqa
portswigger.net
0
6
67
The content of a <script> inside <math> or <svg> is treated as text. If the browser hits an HTML tag they can't handle, like <img>, it closes them and places the tag outside. What looks like commented-out JS isn't. https://t.co/O0ZsVMUT00
#xss
1
20
129
We’re exploring what truly drives people into cybersecurity. celebrating the explorers, the questioners, and the quietly determined minds. We know that not everyone came to cyber through coding or gaming. #oooarrcyber
0
3
3
Hey everyone! I’ve been building rep+, a lightweight HTTP Repeater inside Chrome DevTools. No proxy setup or certificates. Just open DevTools and start poking requests. It also has built-in AI for explanations and attack ideas. I’ll share one rep+ feature every day. Try it 👇
43
157
883
💚 Events like BSides Exeter don’t happen without our incredible sponsors. Your support keeps tickets affordable, gives new voices a platform, and helps us celebrate this year’s theme — “Curiosity Made the Cyber Pro.” 👉 https://t.co/O0566Y8ZiM
#oooarrrcyber
0
7
7
CURIOSITY BUILT THE CYBER PRO Every cyber security and digital forensics professional started the same way — curious, determined, and probably told to “get off that computer!” or “you’ve been online too long!” #oooarrcyber
0
2
2
This is both hilarious and an educational read!
Hello! Just published a new research with ( @sml555_ , @codecancare) 🍻 Who Needs A Blind XSS? https://t.co/bUpFj1p0Mh
#CyberSecurity #BugBounty
0
0
0
We have a copy at the office now. Just get it, it's great!
HackFriday starts now JavaScript for Hackers is on sale for $13.37 and the deal runs past Hack Friday Boost your payload skills and sharpen your hacking game Grab it while it lasts 🔥 https://t.co/84e3xYGQu4
0
0
3
HackFriday starts now JavaScript for Hackers is on sale for $13.37 and the deal runs past Hack Friday Boost your payload skills and sharpen your hacking game Grab it while it lasts 🔥 https://t.co/84e3xYGQu4
amazon.com
2
8
40
"Burp AI can bring up a new generation of hackers faster and more effectively.​​​​​​" In his new article, @hAPI_hacker explores how Burp AI: 🔬 Analyzes requests and adapts when attacks fail. 💬 Explains findings in clear language. 💪 Enhances human decision-making. 👉
portswigger.net
AI isn’t just reshaping cybersecurity - it’s challenging testers to rethink their entire playbook. In his latest article, “Hacking with Burp AI in the Chesspocalypse”, API expert Corey Ball draws less
1
7
47
🚀 Shadow Repeater just got a big upgrade! It now detects response timing differences. https://t.co/aFDXmazHYz
thespanner.co.uk
The new version of Shadow Repeater has been released with a couple of cool new features. Timing differences Shadow Repeater analyses your Repeater requests and looks for response differences but it...
0
1
25
Want to experiment with Anomaly Rank on arbitrary requests anywhere inside Burp Suite? Nick Coblentz made an extension for that! Try it out here:
github.com
Contribute to ncoblentz/BurpExtensionAnomalyRankContextMenu development by creating an account on GitHub.
I've just upgraded Turbo Intruder with a shiny new algorithm called HTTP Anomaly Rank, which automatically finds the most unusual responses in your attack! Here's a quick demo, full details in the writeup below:
0
6
46