Jacob LummusMy XSS vulnerability scanner (work in progress)I’ve set myself a goal of understanding XSS vulnerabilities more and to find one in the wild this year.5 min read·2 days ago--
KhaledyasseninInfoSec Write-upsHow I Found Multiple XSS Vulnerabilities Using Unknown TechniquesHello, everyone. I hope you are well.12 min read·Mar 5, 2024--15
Sameeha LiziUnderstanding Buffer Overflow Vulnerabilities: A Comprehensive GuideIn the realm of cybersecurity, understanding vulnerabilities is crucial to fortifying digital defenses. One such vulnerability that has…2 min read·2 days ago----
Anas Eladly ( 0x3adly )How i bypassed input limitations to get Admin ATOبِسْمِ اللَّـهِ الرَّحْمَـٰنِ الرَّحِيمِ3 min read·Mar 6, 2024--2--2
Jacob LummusMy XSS vulnerability scanner (work in progress)I’ve set myself a goal of understanding XSS vulnerabilities more and to find one in the wild this year.5 min read·2 days ago--
KhaledyasseninInfoSec Write-upsHow I Found Multiple XSS Vulnerabilities Using Unknown TechniquesHello, everyone. I hope you are well.12 min read·Mar 5, 2024--15
Sameeha LiziUnderstanding Buffer Overflow Vulnerabilities: A Comprehensive GuideIn the realm of cybersecurity, understanding vulnerabilities is crucial to fortifying digital defenses. One such vulnerability that has…2 min read·2 days ago--
Anas Eladly ( 0x3adly )How i bypassed input limitations to get Admin ATOبِسْمِ اللَّـهِ الرَّحْمَـٰنِ الرَّحِيمِ3 min read·Mar 6, 2024--2
MayankchoubeyExfiltrating Sensitive Information via Reflected XSS Bypassing CloudflareHello Everyone, Welcome to my inaugural blog post! I’m Mayank, and I’m thrilled to embark on this journey of sharing knowledge and…4 min read·Mar 11, 2024--
Rohan GiriThe first thing we do before understanding the website deeply, is to create an account.Try exploiting signup vulnerabilities like SQL injection, XSS or weak passwords. Find them, report them, earn rewards!2 min read·6 days ago--
Daniel AngelPreventing XSS Attacks in your Spring Boot APIXSS (Cross-Site Scripting) attacks pose a significant threat to web applications. In this tutorial, you’ll learn how to implement security…5 min read·Jan 2, 2024--4