Gaining access to Uber’s user data through AMPScript evaluation – Assetnote
Modern development and infrastructure management practices are fast paced and constantly evolving. In the race to innovate and expand, new...
Read more →Modern development and infrastructure management practices are fast paced and constantly evolving. In the race to innovate and expand, new...
Read more →I recently found a nice insecure direct object reference (IDOR) in New Relic which allowed me to pull data from...
Read more →Ever since I was a kid I was never good at doing schoolwork. I had envied everyone that seemed to...
Read more →Serverless is awesome and I can’t believe this stuff is free. I’m releasing some serverless functions that I’ve developed over...
Read more →I don’t have automation in my bug hunting, no sqlmap, sublist3r or jsparser. I tried, they just don’t work out...
Read more →Bug Bounties Using only Burp & Browser – 30 DAY RESULTS (UNEXPECTED) Source link
Read more →“If you are doing a task more than twice? Then, automate it!” I hear that phrase all the time, but...
Read more →Hacking on a plane, by Midjourney AI This is a short write-up about how I could have accessed the personal...
Read more →I hacked Outlook and could’ve read all of your EMAILS! Source link
Read more →CVE-2020-16171: Exploiting Acronis Cyber Backup for Fun and Emails You have probably read one or more blog posts about SSRFs,...
Read more →Broken Access Control – Lab #8 UID controlled by parameter, with unpredictable UIDs | Long Version Source link
Read more →