Home
Company
Publications
Trainings
Blog
Welcome!
Agarri is small company dedicated to the offensive aspects of information security
Recently published vulnerabilities
[+]
Adobe Reader: Multiple memory corruptions during XSLT processing (
APSB 17-11
)
Firefox: Multiple UAF during XSLT processing (
MFSA 2017-10
)
Revive Adserver: Arbitrary PHP deserialization (
REVIVE-SA-2017-001
)
Adobe Reader: Multiple memory corruptions during XSLT processing (
APSB 17-01
)
Firefox: UAF during XSLT processing (
MFSA 2017-01
)
Upcoming "Burp Suite Pro" trainings
[+]
Sept 2022 - English - UTC+2
(Sept 13th, 2022 - Sept 16th, 2022)
Oct 2022 - French - UTC+2
(October 4th, 2022 - October 7th, 2022)
Oct 2022 - English - UTC-4
(October 18th, 2022 - October 21st, 2022)
Latest tweets
[+]
A good list of books ‡οΈπ
https://t.co/vlsCpG6CsX
Mon Jan 30 11:31:07 2023
Nice RCE in VS Code. Yeah, I know, itβs 2-month old...
https://t.co/4smZQwScM1
Fri Jan 27 18:41:45 2023
@rubenLo84758621
@rolando_andia
@apuhccc
π¨ SCAM β¬οΈ
Thu Jan 26 13:34:48 2023
RT'ing my own tweets... π
https://t.co/GJ1XNQs24D
Thu Jan 26 08:52:24 2023
Asking ChatGPT to bypass the Dalle-2 content filter, by
@Adversa_AI
π€ π π€
https://t.co/nLCnxzEzpK
Wed Jan 25 23:49:22 2023
Recent talks
[+]
Nearly generic fuzzing of XML-based formats
Nullcon
(March 2017 - Goa - IN -
slides
-
video
)
Server-side browsing considered harmful
Hackfest
(November 2015 - CA -
video (FR)
)
Hack in Paris
(June 2015 - FR)
HackPra Allstars - OWASP AppSec EU
(May 2015 - NL -
slides
-
video
)
Hunting for top bounties
OWASP CZ
(December 2014 - CZ)
ZeroNights
(November 2014 - RU -
slides
)
Hacktivity
(October 2014 - HU -
video
)
Recent blog posts
[+]
A recap of the Q&A session on Twitter
23/04/2021 07h37
Intruder and CSRF-protected form, without macros
13/01/2020 23h51
Back to blogging?
24/01/2019 15h33
Exploiting a Blind XSS using Burp Suite
04/04/2017 22h55
Deserialization in Perl v5.8
06/02/2016 20h30
webmaster@agarri.fr
Copyright 2010-2023 Agarri