Category: Mix
This is the story about how I’ve chained a seemingly uninteresting request smuggling vulnerability with an even more uninteresting header-based…
Broken Access Control – Lab #8 UID controlled by parameter, with unpredictable UIDs | Short Version Source link
When You Use One Wrong Javascript Module Source link
I originally wanted to name this article “The RCE that everyone missed”, but since it was too “clickbait”, this is…
Emma Stocks | 27 January 2023 at 11:11 UTC We launched the Burp Suite Certified Practitioner (BSCP) certification at the…
Dear Readers, once in a while I enjoy blogging about things unrelated to bug bounties. And so, as it happens,…
How to Hunt for Zip Slip Exploits in Open Source Bug Bounty | huntr.dev #methodology Source link
I QUIT RECON… and made $10,000 in bounties! Source link
Let’s Nmap Source link
[INTERVIEW] [France 3 Alpes] Interview on Ethical Hacking Source link
VPNs, Proxies and Secure Tunnels Explained (Deepdive) Source link
For Cybersecurity Awareness Month 2019, I published a daily blog series especially for non-tech users. I was thinking about writing…