InInfoSec Write-upsbysushil phuyalCookie Jar Overflow: A New Threat to HttpOnly Cookies in XSS Vulnerable ApplicationsCross-Site Scripting (XSS) is often considered a beautiful attack due to its elegance and effectiveness in exploiting vulnerabilities…6d ago
CurityBest Practices for Storing Access Tokens in the BrowserWhen storing tokens, you should weigh the choice of storage against the security risks. Find out about the best solution.Apr 193
Md. Mahim Bin FirojSQLmap cheat sheetDisclaimer: Before using the sqlmap tool, you must have proper permission to play with the database. Hacking is illegal. The author will…5d ago5d ago
Ihor PolataikoSpring Security Guide. Part 10: OAuth client implementationExploring Spring Security OAuth client implementation to enable Single-Sign-On via Github. Custom implementation of OAuth2UserServiceDec 5Dec 5
InInfoSec Write-upsbysushil phuyalCookie Jar Overflow: A New Threat to HttpOnly Cookies in XSS Vulnerable ApplicationsCross-Site Scripting (XSS) is often considered a beautiful attack due to its elegance and effectiveness in exploiting vulnerabilities…6d ago
CurityBest Practices for Storing Access Tokens in the BrowserWhen storing tokens, you should weigh the choice of storage against the security risks. Find out about the best solution.Apr 193
Md. Mahim Bin FirojSQLmap cheat sheetDisclaimer: Before using the sqlmap tool, you must have proper permission to play with the database. Hacking is illegal. The author will…5d ago
Ihor PolataikoSpring Security Guide. Part 10: OAuth client implementationExploring Spring Security OAuth client implementation to enable Single-Sign-On via Github. Custom implementation of OAuth2UserServiceDec 5
Esther AdwetsWebDecode Pico CTF WalkthroughIn cyber security, it is important to have a deep knowledge of what you intend to secure. For instance, understanding how the web works.Aug 16
InSystem WeaknessbyOnurcan GençA Real-World Web Application Penetration Testing Story | Small Mistakes Leads to Major Logic FlawsLearn how to perform real-world penetration testing approach called Logic Flaws.Nov 27
cham3leonBeginner’s Guide to Web Application PentestingAre you interested in understanding and finding vulnerabilities in web applications, and strengthening their security, but do not know…Apr 92