C1h2e1BUG BOUNTY CHECK LIST BY C1I just want to write a check list for myself. This article includes various vulnerability discovery method bypass methods. I hope you can…Dec 21, 20197Dec 21, 20197
C1h2e1Unauthorized access to all user information leaksNow is the Mid-Autumn Festival in China. I returned to school from school. Today is the first day of the three-day holiday. I got up late…Sep 13, 20192Sep 13, 20192
C1h2e1Write up of two HTTP Requests SmugglingThis article about how I found two sites for HTTP Request SmuuglingSep 7, 20191Sep 7, 20191