PentesterLab's Avatar

PentesterLab

@pentesterlab.com

We make learning web hacking and security easier. Online systems, code review, videos & courses that can be used to understand, test and exploit bugs!

723
Followers
0
Following
126
Posts
11.11.2024
Joined
Posts Following

Latest posts by PentesterLab @pentesterlab.com

Preview
vinext: Vibe-Hacking Cloudflare's Vibe-Coded Next.js Replacement Cloudflare built a Next.js replacement in a week with AI for $1100. We pointed Hacktron at it to find what the tests missed.

⛈️ 𝘃𝗶𝗻𝗲𝘅𝘁: 𝗩𝗶𝗯𝗲-𝗛𝗮𝗰𝗸𝗶𝗻𝗴 𝗖𝗹𝗼𝘂𝗱𝗳𝗹𝗮𝗿𝗲'𝘀 𝗩𝗶𝗯𝗲-𝗖𝗼𝗱𝗲𝗱 𝗡𝗲𝘅𝘁.𝗷𝘀 𝗥𝗲𝗽𝗹𝗮𝗰𝗲𝗺𝗲𝗻𝘁
It's raining bugs in the cloud. A great example of agent capabilities on a never-seen-before target: www.hacktron.ai/blog/hacking....

01.03.2026 23:58 👍 0 🔁 0 💬 0 📌 0
Preview
100+ Kernel Bugs in 30 Days High-Scale Driver Vulnerability Research with Agent Swarms

🪟 𝟭𝟬𝟬+ 𝗞𝗲𝗿𝗻𝗲𝗹 𝗕𝘂𝗴𝘀 𝗶𝗻 𝟯𝟬 𝗗𝗮𝘆𝘀
Behind the (impressive) result, the methodology is probably the most important. Make sure you read between the lines: substack.com/home/post/p-....

01.03.2026 23:58 👍 0 🔁 0 💬 1 📌 0
Browser-Based Port Scanning in the Age of LNA

𝗥𝗲𝘀𝗲𝗮𝗿𝗰𝗵 𝗪𝗼𝗿𝘁𝗵 𝗥𝗲𝗮𝗱𝗶𝗻𝗴 - 𝗪𝗲𝗲𝗸 𝟵, 𝟮𝟬𝟮𝟲
Mostly AI...

💻 𝗕𝗿𝗼𝘄𝘀𝗲𝗿-𝗕𝗮𝘀𝗲𝗱 𝗣𝗼𝗿𝘁 𝗦𝗰𝗮𝗻𝗻𝗶𝗻𝗴 𝗶𝗻 𝘁𝗵𝗲 𝗔𝗴𝗲 𝗼𝗳 𝗟𝗡𝗔
Leveraging Local Network Access to create a port scanner! wiki.notveg.ninja/tools/lna-po....

01.03.2026 23:58 👍 2 🔁 3 💬 1 📌 0
Preview
PentesterLab: Learn with our JavaScript Code Review The JavaScript Code Review Badge is our badge dedicated to security code review in JavaScript. It covers the discovery of weaknesses and vulnerabilities using source code review.

6 new code review labs just dropped 🚀
+3 for JavaScript Code Review
+3 for Python Code Review

JS: pentesterlab.com/badges/javas...

Python: pentesterlab.com/badges/pytho...

28.02.2026 04:03 👍 5 🔁 2 💬 0 📌 0
CVE Archeologist's field guide
Methodology and Lessons from 10 Vulnerability Analyses 
Written by Louis Nyffenegger

CVE Archeologist's field guide Methodology and Lessons from 10 Vulnerability Analyses Written by Louis Nyffenegger

As I mentioned last week I ordered some books (which got delivered this week)
CVE ARCHEOLOGIST'S FIELD GUIDE by Louis Nyffenegger @pentesterlab.com

28.02.2026 00:15 👍 1 🔁 1 💬 1 📌 0
Preview
Using threat modeling and prompt injection to audit Comet Trail of Bits used ML-centered threat modeling and adversarial testing to identify four prompt injection techniques that could exploit Perplexity’s Comet browser AI assistant to exfiltrate private Gma...

🤖 𝗨𝘀𝗶𝗻𝗴 𝘁𝗵𝗿𝗲𝗮𝘁 𝗺𝗼𝗱𝗲𝗹𝗶𝗻𝗴 𝗮𝗻𝗱 𝗽𝗿𝗼𝗺𝗽𝘁 𝗶𝗻𝗷𝗲𝗰𝘁𝗶𝗼𝗻 𝘁𝗼 𝗮𝘂𝗱𝗶𝘁 𝗖𝗼𝗺𝗲𝘁
The team at Trail of Bits is sharing some key learnings from their audit of Comet (AI browser) blog.trailofbits.com/2026/02/20/u....

22.02.2026 22:16 👍 2 🔁 0 💬 0 📌 0
Preview
HeroDevs Blog | CVE-2026-0603: Second-Order SQL Injection in Hibernate UPDATE/DELETE (InlineIdsOrClauseBuilder) CVE-2026-0603 is a high-severity second-order SQL injection vulnerability in Hibernate ORM caused by unsafe ID inlining during UPDATE and DELETE operations. Learn impact, root cause, and remediation.

☕️ 𝗖𝗩𝗘-𝟮𝟬𝟮𝟲-𝟬𝟲𝟬𝟯: 𝗦𝗲𝗰𝗼𝗻𝗱-𝗢𝗿𝗱𝗲𝗿 𝗦𝗤𝗟 𝗜𝗻𝗷𝗲𝗰𝘁𝗶𝗼𝗻 𝗶𝗻 𝗛𝗶𝗯𝗲𝗿𝗻𝗮𝘁𝗲 𝗨𝗣𝗗𝗔𝗧𝗘/𝗗𝗘𝗟𝗘𝗧𝗘 (𝗜𝗻𝗹𝗶𝗻𝗲𝗜𝗱𝘀𝗢𝗿𝗖𝗹𝗮𝘂𝘀𝗲𝗕𝘂𝗶𝗹𝗱𝗲𝗿)
A bit of a stretch but an interesting insight into Hibernate: www.herodevs.com/blog-posts/c....

22.02.2026 22:16 👍 0 🔁 0 💬 1 📌 0
Vulnerability Disclosure: JWT Authentication Bypass in OpenID Connect Authenticator for Tomcat – Insinuator.net

😱 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝗗𝗶𝘀𝗰𝗹𝗼𝘀𝘂𝗿𝗲: 𝗝𝗪𝗧 𝗔𝘂𝘁𝗵𝗲𝗻𝘁𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗕𝘆𝗽𝗮𝘀𝘀 𝗶𝗻 𝗢𝗽𝗲𝗻𝗜𝗗 𝗖𝗼𝗻𝗻𝗲𝗰𝘁 𝗔𝘂𝘁𝗵𝗲𝗻𝘁𝗶𝗰𝗮𝘁𝗼𝗿 𝗳𝗼𝗿 𝗧𝗼𝗺𝗰𝗮𝘁
The exact same vulnerability I found in HarbourJWT but in a much cooler target, still not fixed... insinuator.net/2026/02/jwt-....

22.02.2026 22:16 👍 0 🔁 0 💬 1 📌 0
Preview
Almost Impossible: Java Deserialization Through Broken Crypto in OpenText Directory Services › Searchlight Cyber Introduction We recently found ourselves looking into OpenText Directory Services (OTDS). We had seen it present on our customer's attack surface, and it seemed to be an interesting target. OTDS is a ...

☕️ 𝗔𝗹𝗺𝗼𝘀𝘁 𝗜𝗺𝗽𝗼𝘀𝘀𝗶𝗯𝗹𝗲: 𝗝𝗮𝘃𝗮 𝗗𝗲𝘀𝗲𝗿𝗶𝗮𝗹𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝗧𝗵𝗿𝗼𝘂𝗴𝗵 𝗕𝗿𝗼𝗸𝗲𝗻 𝗖𝗿𝘆𝗽𝘁𝗼 𝗶𝗻 𝗢𝗽𝗲𝗻𝗧𝗲𝘅𝘁 𝗗𝗶𝗿𝗲𝗰𝘁𝗼𝗿𝘆 𝗦𝗲𝗿𝘃𝗶𝗰𝗲𝘀
What an adventure in Java Deserialisation... slcyber.io/research-cen....

22.02.2026 22:16 👍 0 🔁 0 💬 1 📌 0
CTFtime.org / justCTF [*] 2020 / Go-fs / Writeup CTF writeups, Go-fs

𝗥𝗲𝘀𝗲𝗮𝗿𝗰𝗵 𝗪𝗼𝗿𝘁𝗵 𝗥𝗲𝗮𝗱𝗶𝗻𝗴 - 𝗪𝗲𝗲𝗸 𝟴, 𝟮𝟬𝟮𝟲
Java x2, Go, JWT and a sprinkling of AI

🦫 𝗖𝗧𝗙𝘁𝗶𝗺𝗲.𝗼𝗿𝗴 / 𝗷𝘂𝘀𝘁𝗖𝗧𝗙 [*] 𝟮𝟬𝟮𝟬 / 𝗚𝗼-𝗳𝘀 / 𝗪𝗿𝗶𝘁𝗲𝘂𝗽
A cool Golang quirk via an unintended CTF solution ctftime.org/writeup/25852.

22.02.2026 22:16 👍 1 🔁 0 💬 1 📌 0

New lab: CVE-2026-24895 — FrankenPHP Path Confusion RCE (Unicode)

People think "lowercase it" is harmless. In Unicode it’s not.

Case folding can do weird mappings (Turkish i, Kelvin sign…), and sometimes worse: UTF-8 byte length changes.

Hands-on lab: pentesterlab.com/exercises/cv...

16.02.2026 01:13 👍 3 🔁 0 💬 0 📌 0
Trailing Danger: exploring HTTP Trailer parsing discrepancies Trailing Danger: exploring HTTP Trailer parsing discrepancies

🚛 𝗧𝗿𝗮𝗶𝗹𝗶𝗻𝗴 𝗗𝗮𝗻𝗴𝗲𝗿: 𝗲𝘅𝗽𝗹𝗼𝗿𝗶𝗻𝗴 𝗛𝗧𝗧𝗣 𝗧𝗿𝗮𝗶𝗹𝗲𝗿 𝗽𝗮𝗿𝘀𝗶𝗻𝗴 𝗱𝗶𝘀𝗰𝗿𝗲𝗽𝗮𝗻𝗰𝗶𝗲𝘀
Probably one of the lesser-known features of HTTP... Trailers. This post provides details on the feature and explains how they can be leveraged to find security issues. www.sebsrt.xyz/blog/trailin....

16.02.2026 01:13 👍 1 🔁 0 💬 0 📌 0
Preview
RCE in Google's AI code editor Antigravity - $10000 Bounty Hacktron AI Research Team discovered a critical RCE in Google’s Antigravity IDE that lets attackers take over your system just by opening a malicious website.

🤖 𝗥𝗖𝗘 𝗶𝗻 𝗚𝗼𝗼𝗴𝗹𝗲'𝘀 𝗔𝗜 𝗰𝗼𝗱𝗲 𝗲𝗱𝗶𝘁𝗼𝗿 𝗔𝗻𝘁𝗶𝗴𝗿𝗮𝘃𝗶𝘁𝘆 - $𝟭𝟬𝟬𝟬𝟬 𝗕𝗼𝘂𝗻𝘁𝘆
A detailed blog post on hacking Antigravity with a lot of interesting details on its inner workings. www.hacktron.ai/blog/hacking....

16.02.2026 01:13 👍 1 🔁 0 💬 1 📌 0

🤺 𝗪𝗵𝗲𝗻 𝗧𝘄𝗼 𝗣𝗮𝗿𝘀𝗲𝗿𝘀 𝗗𝗶𝘀𝗮𝗴𝗿𝗲𝗲: 𝗘𝘅𝗽𝗹𝗼𝗶𝘁𝗶𝗻𝗴 𝗤𝘂𝗲𝗿𝘆 𝗦𝘁𝗿𝗶𝗻𝗴 𝗗𝗶𝗳𝗳𝗲𝗿𝗲𝗻𝘁𝗶𝗮𝗹𝘀 𝗳𝗼𝗿 𝗫𝗦𝗦
If you enjoy parser differential issues, you are going to love this exploit. Don't think "It's a CTF challenge" or "It's just an XSS", read between the lines to find the real gold. blog.voorivex.team/when-two-par....

16.02.2026 01:13 👍 0 🔁 0 💬 1 📌 0
Preview
Introducing Augustus: Open Source LLM Prompt Injection Tool Explore LLM fingerprinting and its role in exposing vulnerable Ollama servers online to unauthorized access risks.

⚒️ 𝗜𝗻𝘁𝗿𝗼𝗱𝘂𝗰𝗶𝗻𝗴 𝗔𝘂𝗴𝘂𝘀𝘁𝘂𝘀: 𝗢𝗽𝗲𝗻 𝗦𝗼𝘂𝗿𝗰𝗲 𝗟𝗟𝗠 𝗣𝗿𝗼𝗺𝗽𝘁 𝗜𝗻𝗷𝗲𝗰𝘁𝗶𝗼𝗻 𝗧𝗼𝗼𝗹
Praetorian is back with another tool (one of their 12 Caesars): Augustus... Make sure you check it out! www.praetorian.com/blog/introdu....

16.02.2026 01:13 👍 0 🔁 0 💬 1 📌 0
Preview
Breaking Down CVE-2026-25049: How TypeScript Types Failed n8n's Security | hetmehta.com Deep technical analysis of CVE-2026-25049: How type confusion bypassed n8n's security patch and why TypeScript types aren't runtime security boundaries

⨐ 𝗕𝗿𝗲𝗮𝗸𝗶𝗻𝗴 𝗗𝗼𝘄𝗻 𝗖𝗩𝗘-𝟮𝟬𝟮𝟲-𝟮𝟱𝟬𝟰𝟵: 𝗛𝗼𝘄 𝗧𝘆𝗽𝗲𝗦𝗰𝗿𝗶𝗽𝘁 𝗧𝘆𝗽𝗲𝘀 𝗙𝗮𝗶𝗹𝗲𝗱 𝗻𝟴𝗻'𝘀 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆
A great explanation of the recent vulnerabilities impacting n8n. If you are working in security on TypeScript projects, it's a must read. hetmehta.com/posts/n8n-ty....

16.02.2026 01:13 👍 1 🔁 0 💬 1 📌 0

𝗥𝗲𝘀𝗲𝗮𝗿𝗰𝗵 𝗪𝗼𝗿𝘁𝗵 𝗥𝗲𝗮𝗱𝗶𝗻𝗴 - 𝗪𝗲𝗲𝗸 𝟳, 𝟮𝟬𝟮𝟲
Parser Differential, TypeScript and AI

👇

16.02.2026 01:13 👍 3 🔁 1 💬 1 📌 0
Preview
What Really Killed Flash Player: A Six-Year Campaign of Deliberate Platform Work This is what it actually took. From the person who architected and drove Chrome’s Flash deprecation from proposal to the final removal in…

⚡️ 𝗪𝗵𝗮𝘁 𝗥𝗲𝗮𝗹𝗹𝘆 𝗞𝗶𝗹𝗹𝗲𝗱 𝗙𝗹𝗮𝘀𝗵 𝗣𝗹𝗮𝘆𝗲𝗿: 𝗔 𝗦𝗶𝘅-𝗬𝗲𝗮𝗿 𝗖𝗮𝗺𝗽𝗮𝗶𝗴𝗻 𝗼𝗳 𝗗𝗲𝗹𝗶𝗯𝗲𝗿𝗮𝘁𝗲 𝗣𝗹𝗮𝘁𝗳𝗼𝗿𝗺 𝗪𝗼𝗿𝗸
The story of the death of Adobe Flash, a must-read for AppSec practitioners. medium.com/@aglaforge/w....

08.02.2026 22:25 👍 0 🔁 0 💬 0 📌 0
Preview
Discovering Negative-Days with LLM Workflows It’s no longer just about reverse-engineering n-days. You can detect vulnerabilities in open-source repositories before a CVE is published - or even if they’re never published. Here’s how I built an L...

🦝 𝗗𝗶𝘀𝗰𝗼𝘃𝗲𝗿𝗶𝗻𝗴 𝗡𝗲𝗴𝗮𝘁𝗶𝘃𝗲-𝗗𝗮𝘆𝘀 𝘄𝗶𝘁𝗵 𝗟𝗟𝗠 𝗪𝗼𝗿𝗸𝗳𝗹𝗼𝘄𝘀
That's something I toyed with in 2012 (Monitoring repositories for Fun and Profit - Ruxcon 2012), I used basic rules at the time. Obviously, having LLMs is a game changer for this kind of workload: spaceraccoon.dev/discovering-....

08.02.2026 22:25 👍 1 🔁 0 💬 1 📌 0
Scalable research tooling for agent systems - KnifeCoat Intro Hello neighbours! There is still little literature on designing offensive research systems and the tools that those systems use. Two likely explanations for this are that teams have internal to…

🛠️ 𝗦𝗰𝗮𝗹𝗮𝗯𝗹𝗲 𝗿𝗲𝘀𝗲𝗮𝗿𝗰𝗵 𝘁𝗼𝗼𝗹𝗶𝗻𝗴 𝗳𝗼𝗿 𝗮𝗴𝗲𝗻𝘁 𝘀𝘆𝘀𝘁𝗲𝗺𝘀
A great post on how to scale tooling for agent: knifecoat.com/Posts/Scalab....

08.02.2026 22:25 👍 2 🔁 0 💬 1 📌 0
Preview
Boost LLM Security: automated Red Teaming at Scale with Promptfoo Find access-control flaws in LLM apps using Promptfoo plugins and strategies.

🚨 𝗔𝗻 𝗶𝗻𝘁𝗿𝗼𝗱𝘂𝗰𝘁𝗶𝗼𝗻 𝘁𝗼 𝗮𝘂𝘁𝗼𝗺𝗮𝘁𝗲𝗱 𝗟𝗟𝗠 𝗿𝗲𝗱 𝘁𝗲𝗮𝗺𝗶𝗻𝗴
Promptfoo is a neat tool to add to your red teaming arsenal: blog.nviso.eu/2026/02/05/a....

08.02.2026 22:25 👍 1 🔁 0 💬 1 📌 0

♦️ 𝗖𝗼 -𝗥𝗲𝗱𝗧𝗲𝗮𝗺: 𝗢𝗿𝗰𝗵𝗲𝘀𝘁𝗿𝗮𝘁𝗲𝗱 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗗𝗶𝘀𝗰𝗼𝘃𝗲𝗿𝘆 𝗮𝗻𝗱 𝗘𝘅𝗽𝗹𝗼𝗶𝘁𝗮𝘁𝗶𝗼𝗻 𝘄𝗶𝘁𝗵 𝗟𝗟𝗠 𝗔𝗴𝗲𝗻𝘁𝘀
If you are working on a "LLM based hacker", you are going to want to read this: arxiv.org/pdf/2602.02164.

08.02.2026 22:25 👍 1 🔁 0 💬 1 📌 0

🤖 𝗘𝘃𝗮𝗹𝘂𝗮𝘁𝗶𝗻𝗴 𝗮𝗻𝗱 𝗺𝗶𝘁𝗶𝗴𝗮𝘁𝗶𝗻𝗴 𝘁𝗵𝗲 𝗴𝗿𝗼𝘄𝗶𝗻𝗴 𝗿𝗶𝘀𝗸 𝗼𝗳 𝗟𝗟𝗠-𝗱𝗶𝘀𝗰𝗼𝘃𝗲𝗿𝗲𝗱 𝟬-𝗱𝗮𝘆𝘀
This section resumes it: "Opus 4.6 is notably better at finding high-severity vulnerabilities than previous models": red.anthropic.com/2026/zero-da....

08.02.2026 22:25 👍 1 🔁 0 💬 1 📌 0

🤿 𝗦𝗵𝗮𝗸𝗶𝗻𝗴 𝘁𝗵𝗲 𝗠𝗖𝗣 𝗧𝗿𝗲𝗲: 𝗔 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗗𝗲𝗲𝗽 𝗗𝗶𝘃𝗲
You may think "just another MCP bug" but this post is actually worth reading: blog.voorivex.team/shaking-the-....

08.02.2026 22:25 👍 1 🔁 0 💬 1 📌 0
Preview
GitHub - semgrep/skills: A collection of skills for AI coding agents from Semgrep A collection of skills for AI coding agents from Semgrep - semgrep/skills

𝗥𝗲𝘀𝗲𝗮𝗿𝗰𝗵 𝗪𝗼𝗿𝘁𝗵 𝗥𝗲𝗮𝗱𝗶𝗻𝗴 - 𝗪𝗲𝗲𝗸 𝟲, 𝟮𝟬𝟮𝟲
Busy week! AI, AI, AI and the death of Flash!

🤖 𝗦𝗲𝗺𝗴𝗿𝗲𝗽'𝘀 𝗔𝗴𝗲𝗻𝘁 𝗦𝗸𝗶𝗹𝗹𝘀
Semgrep released a set of agent skills worth looking into: github.com/semgrep/skills.

08.02.2026 22:25 👍 4 🔁 1 💬 1 📌 0
Execution of the POC performed.

Execution of the POC performed.

🧑‍🎓 Learning of the day for me thanks to @pentesterlab.com and Claude.

🔬 For the regular expression "[A-z]":

In a character class [X-Y], it matches all characters with ASCII codes from X to Y inclusive. So [A-z] means all ASCII characters from 65 (A) to 122 (z).

#appsec #appsecurity

02.02.2026 10:28 👍 4 🔁 1 💬 1 📌 0
Post image

MORE LABS IN OUR JAVASCRIPT CODE REVIEW BADGE:

pentesterlab.com/badges/javas...

06.02.2026 00:53 👍 2 🔁 1 💬 0 📌 0
Preview
CVE-2026-23993: JWT authentication bypass in HarbourJwt via “unknown alg” Deep dive into CVE-2026-23993: HarbourJwt accepts forged JWTs when alg is unknown, bypassing signature checks via empty signatures. Fix + code review lessons.

🪲 CVE-2026-23993: JWT authentication bypass in HarbourJwt via “unknown alg”
I hope no one will mind that I put my own content in there. I^WClaude found a JWT bypass in HarbourJwt: pentesterlab.com/blog/cve-202...

02.02.2026 00:26 👍 2 🔁 0 💬 0 📌 0
Samstung Part 2 :: Remote Code Execution in MagicINFO 9 Server In part 1 I detailed my approach to following a rabbit hole that almost turned into pre-auth remote code execution with a default setup. Although I didn’t ac...

✨ Samstung Part 2 :: Remote Code Execution in MagicINFO 9 Server
Steven Seeley is back with a new blog post and walks us through two bugs with source code to follow: srcincite.io/blog/2026/01...

02.02.2026 00:26 👍 0 🔁 0 💬 1 📌 0

🪲 Insecure Defaults Detection
Trail of Bits is sharing more and more skills. This one to detect: github.com/trailofbits/...

02.02.2026 00:26 👍 0 🔁 0 💬 1 📌 0