Category: Mix
The debate was quite fun to watch, but also frustrating. What irked me about the debate—and all similar debates—is that…
So we’re seeing homograph attacks again. Examples show how ‘apple.com’ and ‘epic.com’ can be mimicked by the use of Internationalized…
While researching a web application last February, I learned about Slanger, an open source server implementation of Pusher. In this…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…
Download my transcription of Bill Evans’ piano solo in I’ve Got You Under My Skin below. The solo starts around…
When performing security tests, you will often be required to send all of your traffic through a VPN. If you…
In this write-up, I want to share a cool way in which I was able to bypass firewall limitations that…
Last May, I discovered that a critical vulnerability I had reported earlier this year had resulted in my first CVE….
An example use case of bbrf, here integrating with subfinder from projectdiscovery.io Like anyone involved in bug bounty hunting, I…
If you’re a Burp Suite user, you’ll be familiar with Burp Collaborator: a service that allows you to monitor out-of-band…
Axel Springer has long been a pioneer in the digital publishing industry, with a vast portfolio of brands, such as…
The Wallarm API Discovery module has been further enhanced to enable customers to identify Orphan APIs and bring them under…










