The Mystery of postMessage – Ron Chan
From time to time we see postMessage bug in H1 hacktivity, some write ups mentioning the word postMessage, but do...
Read more →From time to time we see postMessage bug in H1 hacktivity, some write ups mentioning the word postMessage, but do...
Read more →INTERVIEW WITH @_BASE_64 : 19 Y/o | TOP 150 WORLDWIDE on H1 | METHODOLOGY, MINDSET & MORE… Source link
Read more →I quite enjoy external Pentest, especially when the scope is large. There has been some really interesting stuff I have...
Read more →As a hacker and bug bounty hunter, I spend a lot of my time optimizing and improving. So, as a...
Read more →This is the story about how I’ve chained a seemingly uninteresting request smuggling vulnerability with an even more uninteresting header-based...
Read more →Broken Access Control – Lab #8 UID controlled by parameter, with unpredictable UIDs | Short Version Source link
Read more →When You Use One Wrong Javascript Module Source link
Read more →I originally wanted to name this article “The RCE that everyone missed”, but since it was too “clickbait”, this is...
Read more →Emma Stocks | 27 January 2023 at 11:11 UTC We launched the Burp Suite Certified Practitioner (BSCP) certification at the...
Read more →Dear Readers, once in a while I enjoy blogging about things unrelated to bug bounties. And so, as it happens,...
Read more →How to Hunt for Zip Slip Exploits in Open Source Bug Bounty | huntr.dev #methodology Source link
Read more →