Home
Company
Publications
Trainings
Blog
Welcome!
Agarri is small company dedicated to the offensive aspects of information security
Recently published vulnerabilities
[+]
Adobe Reader: Multiple memory corruptions during XSLT processing (
APSB 17-11
)
Firefox: Multiple UAF during XSLT processing (
MFSA 2017-10
)
Revive Adserver: Arbitrary PHP deserialization (
REVIVE-SA-2017-001
)
Adobe Reader: Multiple memory corruptions during XSLT processing (
APSB 17-01
)
Firefox: UAF during XSLT processing (
MFSA 2017-01
)
Upcoming "Burp Suite Pro" trainings
[+]
Sept 2022 - English - UTC+2
(Sept 13th, 2022 - Sept 16th, 2022)
Oct 2022 - French - UTC+2
(October 4th, 2022 - October 7th, 2022)
Oct 2022 - English - UTC-4
(October 18th, 2022 - October 21st, 2022)
Latest tweets
[+]
Currently broken: use the "+" sign above to access the full profile
Recent talks
[+]
Nearly generic fuzzing of XML-based formats
Nullcon
(March 2017 - Goa - IN -
slides
-
video
)
Server-side browsing considered harmful
Hackfest
(November 2015 - CA -
video (FR)
)
Hack in Paris
(June 2015 - FR)
HackPra Allstars - OWASP AppSec EU
(May 2015 - NL -
slides
-
video
)
Hunting for top bounties
OWASP CZ
(December 2014 - CZ)
ZeroNights
(November 2014 - RU -
slides
)
Hacktivity
(October 2014 - HU -
video
)
Recent blog posts
[+]
A recap of the Q&A session on Twitter
23/04/2021 07h37
Intruder and CSRF-protected form, without macros
13/01/2020 23h51
Back to blogging?
24/01/2019 15h33
Exploiting a Blind XSS using Burp Suite
04/04/2017 22h55
Deserialization in Perl v5.8
06/02/2016 20h30
webmaster@agarri.fr
Copyright 2010-2024 Agarri