Senyals

Senyals

@senyals.bsky.social

AppSec Engineer. Application Security, DevSecOps, Threat Modelling. OWASP and Open Source enthusiast. Based in Barcelona.

382 Followers 132 Following 12 Posts Joined Nov 2024
10 months ago
Preview
GitHub - OWASP/wrongsecrets: Vulnerable app with examples showing how to not use secrets Vulnerable app with examples showing how to not use secrets - OWASP/wrongsecrets

We released version 1.11.2 of #OWASP #WrongSecrets: it's faster than ever, has now 55 challenges and a lot of fun! Check it out at github.com/OWASP/wrongs... or test it at www.wrongsecrets.com and don't forget to give the repo a ๐ŸŒŸ if you like it!

17 6 1 1
10 months ago
Post image

I just built a custom action to let you test for race conditions with a single click! No tab groups required, and it uses the cutting edge single-packet attack under the hood: gist.github.com/albinowax/10...

For more info check out portswigger.net/research/sma...

16 2 0 0
11 months ago
Post image

Ever heard of LLM poisoning? ๐Ÿค”

Recently, Leif Dreizler joined Travis McPeak and William Bengtson on the @404security.bsky.social podcast to discuss how misinformation websites are intentionally spreading fake news to influence AI model responses.

๐ŸŽง Listen here: www.resourcely.io/podcast/deal...

3 1 0 0
11 months ago

I will for sure!

1 0 0 0
11 months ago

I will attend!

1 0 1 0
11 months ago
Preview
Lesley, What Happened to the โ€œCybersecurity Skills Shortageโ€? Are you stressed out right now? Iโ€™m stressed out. Most Americans are, and cybersecurity job seekers are definitely not an exception. I do a ton of career mentoring and career clinics, and I sโ€ฆ

Hello friends. The dreaded and long awaiting blog on WHAT THE FUCK HAPPENED TO THE CYBERSECURITY JOBS MARKET has arrived.

tisiphone.net/2025/04/01/l...

I'm sorry.

275 84 16 10
11 months ago
Post image

As a follow up to @maxenceschmitt.bsky.social's amazing #CSPT research, we've published a list of resources to help people interested in this class of vulnerabilities. Check it out today for video, tools, challenges and variety of publications!

blog.doyensec.com/2025/03/27/c...

#Doyensec #appsec

2 2 0 0
1 year ago
Preview
State of Threat Modeling (SOTM) 2024 Survey Welcome to the first-ever State of Threat Modeling (SOTM) Survey! What is the SOTM Survey? The SOTM Survey is part of the research for the first community-driven State of Threat Modeling (SOTM) Repor...

The Threat Modeling Connect community are launching the first-ever community-driven State of Threat Modeling (SOTM) Report, led by @rewtd.bsky.social
and Dave Soldera, and weโ€™d love your input!
docs.google.com/forms/d/e/1F...
The survey will take 15-20 minutes to complete.

#cybersec #infosec

21 15 0 0
11 months ago
Post image Post image

OWASP Global AppSec EU 2025 Barcelona: full training schedule is out now!

Day 3 is packed with even more hands-on training sessions to enhance your AppSec expertise!

Register now:
owasp.glueup.com/eve...

#AppSecEU2025 #Cybersecurity #DevSecOps #SecureCoding #ThreatModeling #Infosec #Barcelona

3 1 0 0
11 months ago
Post image

Exciting news! The #OWASP Global #Appsec SF videos have arrived! ๐ŸŽฅ Get ready to boost your knowledge and skills by checking them out here: www.youtube.com/play...

3 1 0 0
11 months ago
Preview
SAML roulette: the hacker always wins Introduction In this post, weโ€™ll show precisely how to chain round-trip attacks and namespace confusion to achieve unauthenticated admin access on GitLab Enterprise by exploiting the ruby-saml library

You might have noticed that the recent SAML writeups omit some crucial details. In "SAML roulette: the hacker always wins", we share everything you need to know for a complete unauthenticated exploit on ruby-saml, using GitLab as a case-study.

portswigger.net/research/sam...

53 23 0 4
1 year ago
Slack Invite

There's now a ZAP Slack that's open to everyone. You can get an invite to it via zaproxy.org/slack/invite

9 6 0 0
1 year ago
AppSec Ezine

AppSec Ezine - 573rd pathonproject.com/zb/?3970e59b... #AppSec #Security ๐ŸŽ

5 5 0 0
1 year ago
Post image

๐Ÿค” Based on issues that I have seen during recent assessments, I updated my code sharing project with a method related to JWT based tokens:

#appsec #appsecurity #jwt #web

๐ŸŒ URL:
github.com/righettod/co...
righettod.github.io/code-snippet...

1 1 0 0
1 year ago
Post image

Get ready for an eye-opening session with Kevin Hemmingsen, Director of Trust & Security at Bugcrowd as he explores lessons from bug bounty / offsec to help devs build more securely at the OWASP Security Summit!

OWASP Community Save 25% on tickets: http://www.eventbrit...

3 1 0 0
1 year ago

Practice on Portswigger Academy

1 0 0 0
1 year ago
Preview
Top 10 web hacking techniques of 2024 Welcome to the Top 10 Web Hacking Techniques of 2024, the 18th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year

The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2024! portswigger.net/research/top...

66 36 2 5
1 year ago
GET /%0D%0ASet-Cookie: foo=bar
403 Forbidden

GET /%E4%BC%8D%E4%BC%8ASet-Cookie: foo=bar
200 OK
Set-Cookie: foo=bar

Discover blocklist bypasses via unicode overflows using the latest updates to ActiveScan++, Hackvertor & Shazzer! Thanks to Ryan Barnett and Neh Patel for sharing this technique.

portswigger.net/research/byp...

38 22 0 0
1 year ago
Post image

Sarah-Jane Madden is a keynote speaker at OWASP Global AppSec EU 2025

๐ŸŽŸ๏ธ Attention to those in App Sec, Cybersecurity, and Developers: take advantage of the early bird discount!

Donโ€™t wait, register now!

owasp.glueup.com/eve...

#owaspglobalappseceu2025 #AI #threatmodeling #devsecops #infosec

5 1 0 0
1 year ago

I've just released HTTP Request Smuggler 2.17 which fixes a nasty Client-Side Desync false-negative. Big thanks to @t0xodile.com for reporting it! Hope you all find some nice CSDs in 2025 :)

33 5 1 1
1 year ago
Preview
First Tokens: The Achillesโ€™ Heel of LLMs The Assistant Prefill feature available in many LLMs can open up models to jailbreaking, including the possibility of persistent prefills to bypass LLM safety alignments.

The article: www.invicti.com/blog/securit...

11 1 2 0
1 year ago
Preview
Top ten web hacking techniques of 2024: nominations open Nominations are now open for the top 10 new web hacking techniques of 2024! Every year, security researchers from all over the world share their latest findings via blog posts, presentations, PoCs, an

Nominations are now open for the Top 10 Web Hacking Techniques of 2024! Browse the contestants and submit your own here:
portswigger.net/research/top...

28 19 1 4
1 year ago
Post image

๐Ÿšจ Attention all developers and code enthusiasts! Get ready to elevate your skills with "Alice and Bob Learn Secure Coding." Secure your copy now and embark on a transformative learning experience.
shehackspurple.ca/bo...

9 3 0 0
1 year ago
Preview
Burp suite pro tips and tricks for hacking Burp suite pro tips and tricks for hacking - Download as a PDF or view online for free

Somebody uploaded to SlideShare the slides of my talk at @northsec.bsky.social 2023 ๐ŸŒ

Itโ€™s the sequel of the first @burpsuite.bsky.social talk I ever gave, exactly 10 years before ๐Ÿ› ๏ธ

Enjoy these 50 slides of Burp tips ๐ŸŽ๐ŸŽ…

38 18 0 0
1 year ago

Extended the starter with shy writers! ๐Ÿ˜€ If you're not on the list but write about web security, then feel free to reply with the article you're most proud of, and I will add you to the pack!

Make sure to resubscribe to not not miss on the amazing ๐ŸŒresearch!

go.bsky.app/9JXnB17

29 10 9 0
1 year ago
Screenshot of Burp's HTTP settings, where streaming URLs must be defined Chunked response as seen in Repeater, with chunk metadata (their size) not stripped

Ever wondered why you NEVER see chunked responses in Burp? ๐Ÿค”

The answer is simple, default settings hide them! ๐Ÿซฃ

Go to "Settings > Network > HTTP > Streaming responses" to make them appear ๐Ÿ”

20 6 0 2
1 year ago

Check out the tools I've been working on this year:
๐Ÿ” Hackvertor: Web app: hackvertor.co.uk
๐Ÿ”’ Hackvertor BApp: portswigger.net/bappstore/65...
โšก Shazzer: shazzer.co.uk
๐Ÿ› ๏ธ Recorder: Chrome extension: chromewebstore.google.com/detail/burp-...
๐Ÿ•ต๏ธ DOM Invader: portswigger.net/burp/documen...

16 4 0 0
1 year ago
Overview of the attack flow Overview of how a large number of credentials were leaked Clusters of fake GitHub profiles Phishing e-mail

New research: We've been monitoring a threat actor publishing dozens of trojanized GitHub repositories targeting threat actors, leaking hundreds of thousands of credentials along the way

securitylabs.datadoghq.com/articles/mut...

21 13 0 0
1 year ago
Post image

๐Ÿคซ #sneakpeek #BurpSuite #Intruder

11 4 2 0
1 year ago
Preview
How does Snyk DCAIF Work under the hood? | Snyk Read our technical deep-dive into how Snyk's DCAIF works. To start, with Snyk's Deep Code AI Fix, simply register for a Snyk account here, enable DeepCode AI Fix in your Snyk settings, and start reliably auto-fixing vulnerabilities in seconds.

Snyk SAST has a pretty clever trick to find and fix security vulnerabilities in your code

It applies a CodeReduce algorithm to "compress" your own program code before feeding it to an AI model and this results in improved by 20% success rate of security fixes:

6 1 0 0