Calificación:
  • 0 voto(s) - 0 Media
  • 1
  • 2
  • 3
  • 4
  • 5
Últimos bugs [EN]
Practical Example Of Client Side Path Manipulation
https://erasec.be/blog/client-side-path-manipulation/
Responder
#NahamCon2022EU: Hunting for Amazon Cognito Security Misconfigurations by@yassineaboukir
https://www.youtube.com/watch?v=TuiDJ5Ii6MU
Responder
How to Continuously Detect Vulnerable Jenkins Plugins to Avoid a Software Supply Chain Attack
https://www.legitsecurity.com/blog/how-t...ain-attack
Responder
How I fuzz and hack APIs?
https://rashahacks.com/how-i-fuzz-and-hack-api/
Responder
I scanned every package on PyPi and found 57 live AWS keys
https://tomforb.es/i-scanned-every-packa...-aws-keys/
Responder
Setting up your bug bounty scripts with Python and Bash — The subdomain monitoring bot
https://www.codelivly.com/setting-up-you...-and-bash/
Responder
Unusual Cache Poisoning between Akamai and S3 buckets
https://spyclub.tech/2022/12/14/unusual-...akamai-s3/
Responder
#NahamCon2022EU: I Hope This Sticks: Analyzing ClipboardEvent Listeners for XSS by spaceraccoon
https://www.youtube.com/watch?v=N2UguYUecvQ
Responder
Intigriti obtains SOC 2 certification
https://blog.intigriti.com/2023/01/05/in...ification/
Responder
Bypass firewalls with of-CORs and typo-squatting
https://trufflesecurity.com/blog/of-cors/
Responder


Salto de foro:


Usuarios navegando en este tema: 16 invitado(s)