Jade HillRate Limit Bypass: Injecting HTTP Host Override HeadersAs users can control an applications host header, if the input is not properly escaped or validated, the host header is a potential vector…5d ago5d ago
Jade HillAPT Group Naming Explained: Microsoft, CrowdStrike & MoreAdvanced Persistent Threat (APT) groups are malicious actors who use cyber attacks to gain unauthorised access to a network, often with the…Aug 16Aug 16
Jade HillAccount Takeover: Injecting HTTP Host Override HeadersAs users can control an applications host header, if the input is not properly escaped or validated, the host header is a potential vector…Aug 51Aug 51
Jade HillUncover Hidden Secrets: Using Trufflehog with GitHub Personal Access TokensTrufflehog is a powerful, open-source tool designed to help you discover hidden secrets, such as API keys, passwords, and other sensitive…Aug 1Aug 1