Category: Mix
As a hacker and bug bounty hunter, I spend a lot of my time optimizing and improving. So, as a…
Cookie Tossing Source link
This is the story about how I’ve chained a seemingly uninteresting request smuggling vulnerability with an even more uninteresting header-based…
Broken Access Control – Lab #8 UID controlled by parameter, with unpredictable UIDs | Short Version Source link
When You Use One Wrong Javascript Module Source link
I originally wanted to name this article “The RCE that everyone missed”, but since it was too “clickbait”, this is…
Emma Stocks | 27 January 2023 at 11:11 UTC We launched the Burp Suite Certified Practitioner (BSCP) certification at the…
Dear Readers, once in a while I enjoy blogging about things unrelated to bug bounties. And so, as it happens,…
How to Hunt for Zip Slip Exploits in Open Source Bug Bounty | huntr.dev #methodology Source link
I QUIT RECON… and made $10,000 in bounties! Source link
Let’s Nmap Source link
[INTERVIEW] [France 3 Alpes] Interview on Ethical Hacking Source link







![[Research] Phishermans Friend – Getting control over a phishing backend [Research] Phishermans Friend – Getting control over a phishing backend](https://image.cybernoz.com/wp-content/uploads/2023/03/Research-phishermans-friend--getting-control-over-a-phishing-backend-360x270-1.jpg)



![[INTERVIEW] [France 3 Alpes] Interview on Ethical Hacking [INTERVIEW] [France 3 Alpes] Interview on Ethical Hacking](https://image.cybernoz.com/wp-content/uploads/2023/03/INTERVIEW-France-3-Alpes-Interview-on-Ethical-Hacking-360x270.jpg)