Mahmoud M. AwaliLet me BXSS ’em allHi in this write-up , I’m going to explain how you can create a polyglot BXSS payload to work in all contexts .Dec 4
Sharat KaikolamthuruthilConfigure XCode iOS Simulator + Burpsuite for pentesting on MacOsPre-requisites :-Feb 1
Tanmay BhattacharjeeExploiting server-side parameter pollution in a REST APITo start API testing, you first need to find out as much information about the API as possible, to discover its attack surface.Oct 21Oct 21
0xBobbyHow to find the Origin IPவணக்கம் மக்களே!!! I’m Boopathi. In this blog, what you need to know is How to find the Origin IP…Jul 13, 202213Jul 13, 202213
_K3rnelRole-based Privilege Escalation Worth $2000 in a bug bounty programHi everyone, my name is amin aliakbari, I’m a full time Pentester, Red Teamer and bug bounty hunterAug 13Aug 13
Mahmoud M. AwaliLet me BXSS ’em allHi in this write-up , I’m going to explain how you can create a polyglot BXSS payload to work in all contexts .Dec 4
Sharat KaikolamthuruthilConfigure XCode iOS Simulator + Burpsuite for pentesting on MacOsPre-requisites :-Feb 1
Tanmay BhattacharjeeExploiting server-side parameter pollution in a REST APITo start API testing, you first need to find out as much information about the API as possible, to discover its attack surface.Oct 21
0xBobbyHow to find the Origin IPவணக்கம் மக்களே!!! I’m Boopathi. In this blog, what you need to know is How to find the Origin IP…Jul 13, 202213
_K3rnelRole-based Privilege Escalation Worth $2000 in a bug bounty programHi everyone, my name is amin aliakbari, I’m a full time Pentester, Red Teamer and bug bounty hunterAug 13
Abhijeet kumawatDay 4: Mastering SQLi — Essential Tricks & Techniques Based on Personal Experience and Valuable…[ In collaboration with Sunil Kumawat( his LinkedIn | Twitter)]Aug 6
Aswin Thambi PanikulangaraBug Bounty Recon (Part-2)Previous Part: https://aswinthambipanik07.medium.com/bug-bounty-recon-part-1-dad7f86d1b0fJun 5, 20234
Brian OkinyiOAuth Misconfiguration Leads to 0-Click Account TakeoverImagine logging into a website using your social media account to save time. While OAuth is designed to be secure, a flaw in this process…Apr 3