Category: Mix
Attacking Language Server JSON RPC Source link
It has become a tradition that I publish a review at the end of each year. Unlike previous years I…
Hacking CI/CD (Basic Pipeline Poisoning) Source link
ToolTime – Cloud Recon 1 Source link
Back in October, I found a couple of issues in Etsy, which when combined could be used in a click-jacking…
The EU Cyber Resilience Act aims to protect Europe from increasingly sophisticated cyber-threats. The first quarter of 2023 has seen…
we faced (w/ @celalerdik) an interesting ssti vulnerability on a bugcrowd’s program. we could show the traditional 49’ number when…
Advent of Cyber 2022: Day 16 SQLi’s the king, the carolers sing (Walkthrough) Source link
How They Got Hacked Episode Fifty Eight 58 Source link
An example use case of bbrf, here integrating with subfinder from projectdiscovery.io Like anyone involved in bug bounty hunting, I…
Finding security vulnerabilities with GitHub’s new code search Source link
1 min read 💎 Cullinan :: Develop Elixir Cheatsheet HAHWUL in cullinan Source link