Category: Mix
Deserialization in Perl v5.8 During a pentest, I found an application containing a form with a hidden parameter named “state”….
March has arrived and is roaring like a very confused lion, at least in the northern hemisphere. And much like…
Scanning for hardcoded secrets in source code | Security Simplified Source link
Clip: Subnets and Subnet Masks Source link
Hey there, I hope you’ve been doing well! Bingo with Flair 97% of Bingo games in America happen in a…
Interview with a bounty hunter – “I made 10k$!” – Virdoex_Hunter Source link
HackerOne disclosed a bug submitted by manish_adz: https://hackerone.com/reports/1886143 – Bounty: $500 Source link
In Facebook Graph API as defined by the developer documentation, there are several access tokens, to authenticate against various API…
Build, Break, and Hack WebSockets Source link
Is Apple deliberately killing our batteries? Source link
Back in February of this year I hacked with members of BugBountyHunter.com on a public bug bounty program and we…
Proof of concept. The username of the database user starts with ‘hema’. BackgroundThese days almost every website uses a database….