Mohammad Awab Hassan NizamiPractical Bug Bounty — TCM Academy | Module 5Module 5 — Reconnaissance and Information Gathering1d ago
RAVI SHANKARHow to detect Polyfill[.]io on a websiteAt work, I manage a platform that hosts over 150 public websites. When the polyfill[.]io supply chain attack surfaced, we were initially…6d ago
Ajay MongaInside SAST Tools: How They Work and Why You Need ThemThe Inner Workings of SAST Tools: An In-Depth Exploration and How Static Application Security Testing Works1d ago1d ago
DhamotharanPhpMyAdmin Setup is Accessible Without AuthenticationDescription:Jun 15, 20222Jun 15, 20222
BullsEyeYour Go-To Resources for AppSec and Cybersecurity NewsStay ahead in AppSec and cybersecurity with these top resources.2d ago2d ago
Mohammad Awab Hassan NizamiPractical Bug Bounty — TCM Academy | Module 5Module 5 — Reconnaissance and Information Gathering1d ago
RAVI SHANKARHow to detect Polyfill[.]io on a websiteAt work, I manage a platform that hosts over 150 public websites. When the polyfill[.]io supply chain attack surfaced, we were initially…6d ago
Ajay MongaInside SAST Tools: How They Work and Why You Need ThemThe Inner Workings of SAST Tools: An In-Depth Exploration and How Static Application Security Testing Works1d ago
BullsEyeYour Go-To Resources for AppSec and Cybersecurity NewsStay ahead in AppSec and cybersecurity with these top resources.2d ago
XcheaterinInfoSec Write-upsBreaking Down SSRF on PDF Generation: A Pentesting GuideHello Hackers, I Hope you guys are doing well and hunting lots of bugs and dollars !Jul 21, 2023
Edwin KwanYou’re Using More Open-Source Than You RealiseMy recent conference presentation on open-source security revealed a common theme. Audience members didn’t realise how pervasive…Jul 2
Gökhan GüzelkokarAttacking Misconfigure Spring Boot ActuatorsIn this story I’ll write about spring boot actuators. I’ll explain the components and we will see Hackerone reports about it. It’s very…Aug 7, 2023