24BkDoorIs this Tomcat a weakling Apache?Understanding Weak Tomcat Authentication and ExploitationNov 22, 2023Nov 22, 2023
24BkDoorSecurity Vulnerabilities in Indeed Platform: A Curious ExplorationOverviewNov 10, 2023Nov 10, 2023
24BkDoorWhispers of the Cybersphere: The Chronicles of Vulnerability — 35.193.216.79Google Cloud is a comprehensive suite of cloud computing services offered by Google. It provides a variety of services for computing…Nov 8, 2023Nov 8, 2023
24BkDoorSecurity Vulnerabilities — Appspot.com — Owned by GoogleExposing Critical Security Flaws and Urging ActionNov 1, 20231Nov 1, 20231
24BkDoorUpdate on CM.com SSRF that was reported to Intigriti Bug Bounty PlatformHow Intigriti ch**ted me out of SSRF like HackerOne did —Educational Ethcical Purposes for Educational stuffOct 25, 20233Oct 25, 20233
24BkDoorDefending the Digital Domain: Battling Cross-Site Scripting VulnerabilitiesThe case of aphazwordpress.azurewebsites.netOct 22, 2023Oct 22, 2023
24BkDoorThe Hidden Weakness Of Improper Access ControlThe case of facafacil.es.gov.brOct 22, 2023Oct 22, 2023