Category: Mix
Overview On August 24th, 2022, we reported a vulnerability to Netlify affecting their Next.js “netlify-ipx” repository which would allow an…
ChiBrrCon 2020: Don’t Cross Me! Same Origin Policy and all the “cross” vulns Source link
During the process of testing GAE after reading this awesome blog post, I found a debug application in Google Cloud…
FROM 0 to $$$$ – MY BIGGEST BUG BOUNTY LEARNINGS! Source link
I was recently invited to present at BountyCon 2020. This was supposed to early March in Singapore where flights and…
For a healthy person in a first world country, the number of things we could do is near infinite. And…
Include This In Your Hacking Workflow by Continuous Monitoring with AuthoGraphQL (How-to guide) Source link
31 January 2020 You have probably heard of the SameSite attribute addition to HTTP cookies since Chrome 51 (and a…
Introduction You probably have read about my recent swamp of CVEs affecting a WordPress plugin called Transposh Translation Filter, which…
Broken Access Control – Lab #7 User ID controlled by request parameter | Short Version Source link
How To Predict Random Numbers Generated By A Computer Source link
For the 3rd and I think last episode of the series, we’re going to continue with the same target as…