Nanak Singh KhuranaInsecure Deserialization — Why it is a vulnerabilityFirst of all before deserialization, let us understand what is serialization.5h ago
Rodolfo Assis (Brute)Top 10 XSS PayloadsThose are the most useful payloads to prove the vast majority of Cross Site Scripting (XSS) vulnerabilities out there.Jul 23Jul 23
Ajay YadavUsing HTTPOnly and Secure Cookies on web servers: how to Do itA lot of people think that session cookies are one of the worst things about HTTP for security and privacy, but current web apps need to…Nov 23, 2023Nov 23, 2023
Nanak Singh KhuranaInsecure Deserialization — Why it is a vulnerabilityFirst of all before deserialization, let us understand what is serialization.5h ago
Rodolfo Assis (Brute)Top 10 XSS PayloadsThose are the most useful payloads to prove the vast majority of Cross Site Scripting (XSS) vulnerabilities out there.Jul 23
Ajay YadavUsing HTTPOnly and Secure Cookies on web servers: how to Do itA lot of people think that session cookies are one of the worst things about HTTP for security and privacy, but current web apps need to…Nov 23, 2023
Deck451Web Security Academy: CSRF — SameSite Strict bypass via sibling domainAnother SameSite=Strict bypass1d ago
Aqeel AhmadHandling JWT Access Token & Refresh Token using Axios in React | React Native App — 2024Comprehensive Guide to Managing JWT Access and Refresh Tokens in Web & Mobile ApplicationsApr 194
Yassen TaalabCross-Site Scripting (XSS) Vulnerabilities:بسم الله، والصلاة والسلام على رسول الله5d ago