Hackers Feed 339
- SAML roulette: the hacker always wins
- 🐝 Hive Five 215 - Prompt Your Way To Personal Growth
- [HackerNotes Ep.114] Single Page Application Hacking Playbook
- 🐝 Hive Five 214 - Pressing Buttons
- [HackerNotes Ep.113] Best Technical Takeaways from Portswigger Top 10 2024
- 🐝 Hive Five 213 - Agency > Intelligence
- [HackerNotes Ep.112] Interview with Ciarán Cotter (MonkeHack) Critical Lab Researcher and Full-time Hunter
- The cost of Go's panic and recover
- 🐝 Hive Five 212 - Vibe Coding
- [HackerNotes Ep.111] How to Bypass DOMPurify with Kévin Mizu
- Shadow Repeater:AI-enhanced manual testing
- 🐝 Hive Five 211 - Stop Working So Hard
- [HackerNotes Ep.110] Oauth Gadget Correlation and Common Attacks
- Bee-yond the Hive: Optimal keyboard shortcuts
- 🐝 Hive Five 210 - We Are Destroying Software
- Quoting Dr. Julie Gurner: "Talent is a high-risk gift."
- [HackerNotes Ep. 109] Creative Recon - Alternative Techniques
- Top 10 web hacking techniques of 2024
- 🐝 Hive Five 209 - New Space
- [HackerNotes Ep.108] How to Hack Salesforce, ServiceNow, and Other SaaS Products With Aaron Costello
- Programmatic handling of CORS-configuration errors with jub0bs/cors
- Bypassing character blocklists with unicode overflows
- 🐝 Hive Five 208 - Nobody Cares
- [HackerNotes Ep.107] Bypassing Cross-Origin Browser Headers
- Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel
- Stealing HttpOnly cookies with the cookie sandwich technique
- 🐝 Hive Five 207 - Brain Rot and One Man Armies
- [HackerNotes Ep.106] Announcing our new Co-Host...
- 🐝 Hive Five 206 - AI Crash Course
- [HackerNotes Ep.105] Best Moments of 2024 on the Pod
- Top 10 web hacking techniques of 2024: nominations open
- 🐝 Hive Five 205 - Join or die
- 🍯 Bee-side 204 - COBOL Jobs Domain & Browser-Based Background Removal
- [HackerNotes Ep.104] 2024 Hacker Stats & 2025 Goals
- [HackerNotes Ep.103] Getting ANSI about Unicode Normalization
- 🐝 Hive Five 204 - Make Change That Lasts
- 🍯 Bee-side 203 - AI Innovation, Dev Tools & Digital Security
- 🐝 Hive Five 203 - How To Live an Epic Life
- 🍯 Bee-side 202 - Security Tools, AI Innovation & Dev Productivity
- [HackerNotes Ep.102] Building Web Hacking Micro Agents with Jason Haddix
- 🐝 Hive Five 202 - A Bias to Action
- 🍯 Bee-side 201 - Web Security Patterns, AI Integration & Growth Hacking Strategies
- [HackerNotes Ep.101] AI Attack Vectors - CTBB Hijacked - Rez0__ and Johann
- [HackerNotes Ep.100] 8 Fav Bugs of 2024, Farewell Joel, Hello Shift - Cursor of Hacking
- Program Manager’s Guide To Running a Successful Bug Bounty Program
- Bypassing WAFs with the phantom $Version cookie
- [HackerNotes Ep.99] Back to the Basics - Web Fundamental to 100k a Year in Bug Bounty
- [HackerNotes Ep.98] Team 82 Sharon Brizinov - The Live Hacking Polymath
- See you back in January
- [HackerNotes Ep.97] Bcrypt Hash Input Truncation & Mobile Device Threat Modeling
- [HackerNotes Ep.95 & Ep.96] Cookies, Caching & Attacking Chrome Extensions with MatanBer
- New crazy payloads in the URL Validation Bypass Cheat Sheet
- 👩💻IW Weekly #134: Javascript Vulnerabilities, Microsoft ServiceNow Hacked, Recon Framework, Powershell on Web, Zendesk Vulnerability, Filtering Hostnames and many more…
- Concealing payloads in URL credentials
- 👩💻IW Weekly #133: Tools For Recon, Sandbox Bypass in Chromium Browser, Zendesk Vulnerability, CVE-2024-23113, SAML XPath Confusion, AI-Powered 403 Bypassers and many more…
- 👩💻IW Weekly #132: Account Takeover on Palo Alto Networks, SQLi Cheat Sheet, Pre-Auth SQL Injection in WhatsUp Gold, SSRF Automation, Bypassing Sanitizers using MXSS, and many more…
- 👩💻IW Weekly #131: ROP For Security Bypass, Ruby Class Pollution, Mobile Hacking, Reverse Engineering, Hacking Websites With ZIP Files and many more…
- 👩💻IW Weekly #130: Hacking Trello Board Instances, Hacker Mentality, Regex, Google Dorks, CodeQL Fundamentals and many more…
- 👩💻IW Weekly #129: Google VRP Blog, CVE-2024-29847 Exploit, Hotstar Hacked, Bug Bounty Tips, OSINT Explained, and many more…
- Hacking Kia: Remotely Controlling Cars With Just a License Plate
- 👩💻IW Weekly #128: Bug Bounty, Cloud Dorking, Asset Discovery, Reconnaissance,Vulnerabilities in the Kakadu JPEG 2000 and in Azure DevOps,VPN Cookies Hijacking, and many more…
- 👩💻IW Weekly #127: Nanocore Obfuscation, Code Protection Bypass, Gmail HTML Injection, Remote Code Execution, X-Correlation Injection Research, and many more…
- Introducing the URL validation bypass cheat sheet
- 👩💻IW Weekly #126: Bypassing Airport Security, XSS on Netlify’s Image CDN, Frans Rosén’s X-Correlation Research, Prompt Injection on Microsoft Copilot, Type Confusion Flaw in Chrome, and many more…
- 👩💻IW Weekly #125: AWS ALBeast Vulnerability, SSRF Bug In Microsoft’s Copilot Studio, Cache Misconfiguration Exploit, Web Caching, DEF CON 32, Game Hacking, and many more…
- 👩💻IW Weekly #124: XSS WAF Bypass, Google and Github Dorks, XSS via CSPT, Bug Hunting Methodology, and many more…
- 👩💻IW Weekly #123: Web Timing Attacks, Confusion Attacks, LUCI AuthDB Leak, LHEs vs Pwn2Owns, Reverse Engineering 101 and many more…
- Gotta cache 'em all: bending the rules of web cache exploitation
- Splitting the email atom: exploiting parsers to bypass access controls
- Listen to the whispers: web timing attacks that actually work
- 👩💻IW Weekly #122: SSRF, Password Reset Vulnerability, XSS in Hotjar, Single-Packet Attack, WhatsApp Desktop Code Execution, Business Logic Errors and many more…
- 👩💻IW Weekly #121: RCE on Kafka UI, $2000 Bounty, Advanced SQL Injection Techniques, AWS Cognito Misconfigurations, Payment Bypass, and many more…
- 👩💻IW Weekly #120: Mass Request Smuggling, 1000$ Open Redirect, CSS Injection, Jupyter Auth Token Leak, CrowdStrike Issue and many more...
- 👩💻IW Weekly #119: Universal Code Execution, Evernote RCE, Multiple ServiceNow CVEs, Escalating XSS Using Password Managers, DOMPurify Bug, CSS Injections and many more…
- Fickle PDFs: exploiting browser rendering discrepancies
- 👩💻IW Weekly #118: Server-Side Request Forgery, Malware Development, IDOR, Match and Replace, Cache Deception and many more…
- Universal Code Execution by Chaining Messages in Browser Extensions
- A hacking hat-trick: previewing three PortSwigger Research publications coming to DEF CON & Black Hat USA
- 👩💻IW Weekly #117: API Hacking, Hacking Large Corporations, CrushFTP Exploit, NextJS & Cache Poisoning, Prototype Pollution, Nested Deserialization and many more…
- 👩💻IW Weekly #116: GitHub Copilot Prompt Injection, r2frida for iOS Runtime Manipulation, Data Exfiltration from Restricted Environment, iOS URL Scheme Hijacking and many more…
- 👩💻IW Weekly #115: Abusing Auto-Mail Responders, $25,000 Github Takeover, AI in Bug Hunting, RCE on Tenda AC8 Router, GraphQL Hacking and many more…
- onwebkitplaybacktargetavailabilitychanged?! New exotic events in the XSS cheat sheet
- 👩💻IW Weekly #114: 4-Step Bug Hunting Methodology, CVE-2024-4358, Reflector, Bypass SSL Pinning, GraphQL API Vulnerabilities and many more…
- 👩💻IW Weekly #113: Subdomain Takeovers to Credential Leaks, Stored XSS to RCE, VSCode SFTP File Exposure, $203K Bounties for Bugs in Azure Health Bot and many more…
- Hacking Millions of Modems (and Investigating Who Hacked My Modem)
- Five easy ways to hack GraphQL targets
- Refining your HTTP perspective, with bambdas
- Bug Bounty Calculator—Crunch the numbers and optimize your program
- 👩💻IW Weekly #112: XXE in Chrome, SQL Injection Cheatsheet, Misconfigurations in Azure, Hacking WordPress Plugins, and many more…
- Cache Me If You Can: Local Privilege Escalation in Zscaler Client Connector (CVE-2023-41973)
- Introducing SignSaboteur: forge signed web tokens with ease
- 👩💻IW Weekly #111: SSRF in NextJS, Blind SSRF on WordPress, ChatGPT Rate Limit Bypass, IDOR at Swiggy and many more...
- Reconfigurable CORS middleware with jub0bs/cors
- 👩💻IW Weekly #110: GitHub Actions Cache Poisoning, CVE-2024-0200, Relative Path File Injection, Hacking Apple, Hacking Microsoft's AI bot and many more…
- 👩💻IW Weekly #109: Hacking Telegram, Raining IDORs and BACs, Microsoft Graph Logging Bypass, HTMX Bugs, Wordlist for CI/CD Hacking and many more…
- 👩💻IW Weekly #108: PostMessage for XSS, Smart Contract Security, Admin Panel Takeover, DOM-XSS to ATO, Process Injection With C, Privilege Escalation and many more …
- jub0bs/cors: a better CORS middleware library for Go
- 👩💻IW Weekly #107: CVE-2024-0333, $50,000 for hacking Google A.I, Auth-Bypass via Response Tampering, HTTP Request smuggling case study, Telegram RCE and many more…
- 4 bug bounty mistakes and how to avoid them
- 👩💻IW Weekly #106: Hacking ICON Blockchain, BatBadBut Vulnerability, DOM XSS to ATO, Starbucks Hack, Bypassing Phone Number Verification and many more…
- 👩💻IW Weekly #105: XZ Utils Backdoor, DOMPurify Bypass, Secondary Context Bugs, Hacking ISPs, Email Verification Bypass, Gesture Jacking and many more…
- 👩💻IW Weekly #104: ClickHouse, Velociraptor, WAF bypass techniques, Path Traversal Vulnerabilities, io_uring Vulnerability in Ubuntu, Shockwave Attack Surface Management, .NET Remoting Exploits, Github dorks and many more…
- 👩💻IW Weekly #103: $35K Bounty, Nuances of Aggressive Scans, DLL Side-Loading, Hacking 3 Million Hotel Key Cards, WAF Bypassing Variants and many more…
- Making desync attacks easy with TRACE
- 👩💻IW Weekly #102: Raining RCEs on Citrix, Microsoft Outlook and Fortigate, Security flaws in ChatGPT and third-party plugins, CRLF Injection, and many more…
- Aggressive scanning in bug bounty (and how to avoid it)
- Testing static websites and uncovering hidden security vulnerabilities
- 👩💻IW Weekly #101: CSP Bypass using formaction attribute, 200 hours of hacking to $20K, CVE-2024-1403 analysis, Necessity of DevSecOps, Use of Github Actions to Bypass Microsoft Entra Smart Lockout and many more…
- Using form hijacking to bypass CSP
- 👩💻IW Weekly #100🎉Server-Side Prototype Pollution, Zero-Click ATO Exploit, SSRF Bugs, GRX Interface address using TCP, GraphQL API Schemas, XSS for ATO, IDOR, Unicode Normalization and many more…
- 👩💻IW Weekly #99: Top 10 hacking techniques of 2023, CSP Bypass, Multiple XSS on Joomla, XSS on ChatGPT, Meteor subdomain takeover, Length filter bypass to SQL Injection, Nomulus pentest and many more…
- 👩💻IW Weekly #98: Image to RCE, MySQL Server Access, Hacking College Website, RCE on Apple’s Production Server, Web-Cache Deception Vulnerability, Github Code Search, SSRF on Vercel and many more…
- Top 10 web hacking techniques of 2023
- 👩💻IW Weekly #97: XSS on Microsoft Whiteboard and Excalidraw, ChatGPT Account Takeover, reverse engineered ESP32-based air purifier, advanced HTTP header exploitation techniques, PikaBot Malware Analysis and many more…
- 👩💻IW Weekly #96: Windows Driver to Working EDR, Auth-Bypass within Ivanti’s Pulse Connect Secure, Infostealer Malware, Binary Emulation, Google Domain Tier Concepts and many more…
- Back to the (Clip)board with Microsoft Whiteboard and Excalidraw in Meta (CVE-2023-26140)
- 👩💻IW Weekly #95: From Rook to XSS, CVE-2023-5480, Response Manipulation to Privilege Escalation, Top 10 Web Hacking Techniques for 2023, Unicode Escape Handling in Java and many more…
- Hiding payloads in Java source code strings
- 👩💻IW Weekly #94: 2FA Bypass, Decoding Obfuscated JavaScript, Exploiting Password Reset Functionality, AWS S3 Bucket Takeover, Invisible Prompt Injections and many more…
- High Signal Detection and Exploitation of Ivanti's Pulse Connect Secure Auth Bypass & RCE
- 👩💻IW Weekly #93: GitLab Critical Fixes, Google Info-Stealers, Sandwich Attack, CVE-2023-7028, IDN Homograph Attack, IrisCTF24 Challenges and many more…
- Top 10 web hacking techniques of 2023 - nominations open
- 👩💻IW Weekly #92: Cloudflare Pages Vulnerabilities Analysis, CORS Cache Exploitation Automating RTFM with ChatGPT, Shrewdeye Bash, XSS to ATO, Bypassing Door Passwords and many more…
- 👩💻IW Weekly #92: Hacking Adobe For $50K, Google OAuth Hack, SSTI, Self XSS to Stored XSS, JSLuice Tips, Dealing With Burnout, SQL Injection Worth $4K and many more…
- 👩💻IW Weekly #91: Hacking Adobe For $50K, Google OAuth Hack, SSTI, Self XSS to Stored XSS, JSLuice Tips, Dealing With Burnout, SQL Injection Worth $4K and many more…
- 👩💻IW Weekly #90: Django Debug Mode, Attacking The Rsync Service, DOM XSS to Stored XSS, CVE-2022-2216, Hacking AWS & Kubernetes, Twitter’s XSS + CSRF Leads to Account Takeover and many more…
- Finding that one weird endpoint, with Bambdas
- 👩💻IW Weekly #89: Business Logic Vulnerability, DNS Poisoning, XSS Exploitation to Steal Credentials, Payment Processor Hacking, Second Order SQL Injections, Blind CSS Exfiltration, Symfony Exploits and many more…
- Bug Bytes #218 – Advent of Cyber, RCEs and hacking poems
- Blind CSS Exfiltration: exfiltrate unknown web pages
- 👩💻IW Weekly #88: Process Injection, Race Condition, CLRF to XSS in Snapchat, Active Directory Guide, Main App Hacking Methodology, CSP Research, CORS Misconfigurations and many more…
- 👩💻IW Weekly #87: Okta for Red Teamers, Hijacking OAuth, Account Hijacking via Invite Flows, Full Time Bug Bounty Hunting, Unpredictable IDs in IDOR and many more…
- Bug Bytes #217 – How to Submit Vulnerabilities, Writing a Great WriteUp and 2 years of Bug Bounty
- 👩💻IW Weekly #86: CVE-2023-46729, Hacked Google’s Bug Tracking System, Outsmarting AI Models, Sandbox Escaping, Self-Redirect to XSS, Critical 0-day XXE to SSRF and many more…
- 👩💻IW Weekly #85: LFI to RCE, DoS Bugs, RXSS on Microsoft, Race Conditions, Finding Leaked Tokens, Bypassing URL Parsers and many more…
- 👩💻IW Weekly #84: DOM-based race condition, Bypassing Android Debug and root detection, F5-BIG-IP CVE-2023-46747, SQL injection on admin login , Hacking HP monitor display, Analyzing Metamask snaps and many more…
- Bug Bytes #216 – SQL injections, Android XSS and Writing Quality Reports
- Hacking HP Display Monitors via Monitor Control Command Set (CVE-2023-5449)
- 👩💻IW Weekly #83: CVE-2023-4966, Address Bar Spoofing, SQLi to NTLM, Okta Breach, UPI Security, PII via Frontend Authentication Redirects and many more…
- Bug Bytes #215 – Hackers in Lisbon, AI bug bounty and is this the end?
- 👩💻IW Weekly #82: Single Packet Attack, Nuclei v3, DOM XSS, IDOR Insights, Bypassing CSP, AI & Hacking, Android App Hacking and many more…
- People who say “PHP is insecure” are uninformed
- Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
- The single-packet attack: making remote race-conditions 'local'
- Bug Bytes #214 – We launch a course, bug hunters go full time and the $20k bug
- 👩💻IW Weekly #81: Chrome SOP Bypass, Unauthorized access to Admin panel, Access to Instagram’s private posts, Looney Tunable Linux Privilege escalation [CVE-2023-4911], NoSQL injections and many more…
- 👩💻IW Weekly #80: Broken Access Control, XSS Basics, GraphQL Introspection Query, RCE Vulnerabilities, XSS Challenge, Scanners for Web Security Research and many more …
- Passing the New OSEE Exam After Forgetting Everything
- Cybersecurity is lost: The story of the man in the van
- Bug Bytes #213 – Hacking a Prison, XSS on steroids, CAIDO free for students and Bogus CVEs
- RCE in Progress WS_FTP Ad Hoc via IIS HTTP Modules (CVE-2023-40044)
- How to build custom scanners for web security research automation
- 👩💻IW Weekly #79: RCE in Google Chrome, CVE-2023-40044, OIDC misconfiguration to ATO, accessing millions of call recordings and many more..
- Bug Bytes #212 – XSS Payloads, IDOR prediction and Cloud Security
- 👩💻IW Weekly #78: OAuth Misconfiguration, Account Takeover, Virtual Hosts, SQL Injection, Hacker Tweets, Advanced Root Detection Bypass Techniques and many more..
- 👩💻IW Weekly #77: Azure AD privilege escalation, CVE-2022-3910, Web Cache deception attack, GraphQL enumeration techniques, IDOR and many more..
- Bug Bytes #211 – Hacking Casinos, Microsoft’s Key Mishap, Read the Docs and ImageMagick Strikes Again
- 👩💻IW Weekly #76: Android Native Libraries, Proton Mail’s Security, Source Code & Secrets exposed on Top Websites, Zero Click Mass ATO, CSP Protection Bypass on Google, Hacking Online Casino and many more..
- Bug Bytes #210 – Zenbleed, Interview Questions, Challenge Coins and SQL Injections
- 👩💻IW Weekly #75: Privilege Escalation by request manipulation, PII Disclosure by manipulating parameters, PII leak using misconfigured API, CRLF to XSS, Blind SSRF with Out-of-band Detection and many more..
- 👩💻IW Weekly #74: RCE through Dependency Confusion, 2FA bypass in Meta, Client side Prototype pollution and its prevention, Paywall bypass, SSRF tricks and many more..
- Leaking File Contents with a Blind File Oracle in Flarum
- Advisory: Flarum LFI - CVE-2023-40033
- Bug Bytes #209 – The only graphQL wordlist you need, ML bug hunting and VDP submissions
- 👩💻IW Weekly #73: ATO in Shopify Stores, CVE-2023-36809, Risks in Cross-Chain Bridges, Bypassing Firewalls, Hacking iOS Apps, Uncovering Zenbleed and many more..
- 👩💻IW Weekly #72: GraphQL Hacking, SSO Vulnerabilities, Race Condition Vulnerabilities, SQLMap & Server Side Request Forgery Tips, Sandwich Attack and many more..
- Smashing the state machine: the true potential of web race conditions
- Finding and Exploiting Citrix NetScaler Buffer Overflow (CVE-2023-3519) (Part 3)
- 👩💻IW Weekly #71: Introduction to AD pentesting, XSS via exported activity, using HOTW to leak CSRF token, full access to airline points, SSRFs and many more..
- Leaked Secrets and Unlimited Miles: Hacking the Largest Airline and Hotel Rewards Platform
- 👩💻IW Weekly #70: NFT Bridge Vulnerability, CVE-2023-3519 Deep Analysis, RCE in Huawei Theme Manager, Preauth RCE in Metabase, Chaining Bugs for Session Hijack and many more..
- 👩💻IW Weekly #69: OpenSSH RCE, Xamarin Applications Reverse Engineering, Puzzled XSS, CVE-2023-3519 analysis, XSS and CORS bypass and many more..
- Analysis of CVE-2023-3519 in Citrix ADC and NetScaler Gateway (Part 2)
- Chaining our way to Pre-Auth RCE in Metabase (CVE-2023-38646)
- Analysis of CVE-2023-3519 in Citrix ADC and NetScaler Gateway
- Advisory: Metabase Pre-Auth RCE (CVE-2023-38646)
- Bug Bytes #208 – Burp gets an update, Sharefile gets a CVE and JavaScript files get analysed
- 👩💻IW Weekly #68: Account Takeover using Custom OTP, CVE-2023-36934, Investigating EC2 , XSS in hidden inputs , macOS user's real name brute-forced with mDNS and many more..
- Exploiting XSS in hidden inputs and meta tags
- Bug Bytes #207 -IIS, LLMs and iOS
- 👩💻IW Weekly #67: Joining Google as Red Teamer, Finding 100 vulnerabilities, Tale of DOM-XSS, Impactful SSRF, Busting fake Privacy Policy and many more..
- Bug Bytes #206 – Citrix more like Crit-trix amiright?
- Encrypted Doesn't Mean Authenticated: ShareFile RCE (CVE-2023-24489)
- 👩💻IW Weekly #66: Citrix Gateaway-XSS, Web cache Deception, DNS Analyzer, ATO to XSS in GarphQL API, AWS S3 Bucket Leaks, $250K Coinbase API Hack and many more…
- Advisory: ShareFile Pre-Auth RCE (CVE-2023-24489)
- 10 tips for crushing bug bounties
- Reversing Citrix Gateway for XSS
- Bug Bytes #205 – Live Hacking, AI Hacking and Helicopter Hacking
- Bug Bytes #204 – Everything You Missed From NahamCon
- How I choose a security research topic
- Bypassing CSP via DOM clobbering
- A smorgasbord of a bug chain: postMessage, JSONP, WAF bypass, DOM-based XSS, CORS, CSRF...
- Ambushed by AngularJS: a hidden CSP bypass in Piwik PRO
- Rule Writing for CodeQL and Semgrep
- The curl quirk that exposed Burp Suite & Google Chrome
- Exploiting prototype pollution in Node without the filesystem
- Server-side prototype pollution: Black-box detection without the DoS
- Top 10 web hacking techniques of 2022
- Fearless CORS: a design philosophy for CORS middleware libraries (and a Go implementation)
- DOM-XSS in Instant Games due to improper verification of supplied URLs
- Account takeover of Facebook/Oculus accounts due to First-Party access_token stealing
- Account takeover of Facebook/Oculus accounts due to First-Party access_token stealing
- Account Takeover in Canvas Apps served in Comet due to failure in Cross-Window-Message Origin validation
- Top 10 web hacking techniques of 2022 - nominations open
- Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More
- I Hope This Sticks: Analyzing ClipboardEvent Listeners for Stored XSS
- Hijacking service workers via DOM Clobbering
- So, you want to get into bug bounties?
- Bug Bounty Calculator – Crunch the numbers and optimize your VDP
- Stealing passwords from infosec Mastodon - without bypassing CSP
- Detecting web message misconfigurations for cross-domain credential theft
- Safari is hot-linking images to semi-random websites
- HTTP/3 connection contamination: an upcoming threat?
- Our favourite community contributions to the XSS cheat sheet
- Making HTTP header injection critical via response queue poisoning
- Exploiting Web3's Hidden Attack Surface: Universal XSS on Netlify's Next.js Library
- Challendar: Creating a Challenge for The Infosecurity Challenge 2022
- The seventh way to call a JavaScript function without parentheses
- Existence oracle for Secure cookies on insecure Web origins
- How to turn security research into profit: a CL.0 case study
- Using Hackability to uncover a Chrome infoleak
- Exploiting Improper Validation of Amazon Simple Notification Service SigningCertUrl
- You Have One New Appwntment: Exploiting iCalendar Properties in Enterprise Applications
- Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling
- Scraping the bottom of the CORS barrel (part 1)
- Framing without iframes
- Bypassing Firefox's HTML Sanitizer API
- Widespread prototype pollution gadgets
- The ugly side of collaboration in bug bounties
- The ugly side of collaboration in bug bounties
- Embedding Payloads and Bypassing Controls in Microsoft InfoPath
- Bypassing CSP with dangling iframes
- Multiple bugs chained to takeover Facebook Accounts which uses Gmail.
- Hunting evasive vulnerabilities
- New XSS vectors
- Remote Code Execution vs. Remote Command Execution vs. Code Injection vs. Command Injection vs. RCE
- More secure Facebook Canvas Part 2: More Account Takeovers
- Turbo Intruder – Hacker Tools: Going faster than ever! 👩💻
- Top 10 web hacking techniques of 2021
- CVE-2022-21703: cross-origin request forgery against Grafana
- Solving DOM XSS Puzzles
- Meg – Hacker Tools: Endpoint scan the masses! 👩💻
- EyeWitness – Hacker Tools: Hacking through screenshots 👩💻
- Top 10 web hacking techniques of 2021 - nominations open
- 2Q21: New Year's Reflections
- uBlock, I exfiltrate: exploiting ad blockers with CSS
- The InfoSecurity Challenge 2021 Full Writeup: Battle Royale for $30k
- GoSpider – Hacker Tools: Enumerate the web! 👩💻
- All Your (d)Base Are Belong To Us, Part 2: Code Execution in Microsoft Office (CVE-2021-38646)
- Creating a 3D world in pure CSS
- Abusing Slack's file-sharing functionality to de-anonymise fellow workspace members
- CRLFuzz – Hacker Tools: Injecting CRLF for bounties 👩💻
- Multiple bugs allowed malicious Android Applications to takeover Facebook/Workplace accounts
- Multiple bugs allowed malicious Android Applications to takeover Facebook/Workplace accounts
- All Your (d)Base Are Belong To Us, Part 1: Code Execution in Apache OpenOffice (CVE-2021-33035)
- Waybackurls – Hacker Tools: Time-traveling for bounties 👩💻
- Hunting nonce-based CSP bypasses with dynamic analysis
- Down the Rabbit Hole: Unusual Applications of OpenAI in Cybersecurity Tooling
- Dalfox – Hacker Tools: XSS Scanning Made Easy 👩💻
- KiteRunner – Hacker Tools: Next-level API hacking 👩💻
- More secure Facebook Canvas : Tale of $126k worth of bugs that lead to Facebook Account Takeovers
- 👩💻 Hacker Tools: WPScan – Your WordPress isn’t safe!
- HTTP/2: The Sequel is Always Worse
- How to achieve enterprise-grade attack-surface monitoring with open source software
- A hackers perspective on bug bounty triage
- alert() is dead, long live print()
- Finding DOM Polyglot XSS in PayPal the Easy Way
- Pre-auth RCE in ForgeRock OpenAM (CVE-2021-35464)
- Oversightboard.com site-wide CSRF due to missing checking
- Disclose unconfirmed email/phone of a Facebook user
- Disclose unconfirmed email/phone of a Facebook user
- ROP and Roll: EXP-301 Offensive Security Exploit Developer (OSED) Review and Exam
- A hackers perspective on bug bounty triage
- Hacking, ethics, inner conflict: Are we on the brink of a Hacktivism revival?
- List of Cybersecurity Subreddits
- Life's a Peach (Fuzzer): How to Build and Use GitLab's Open-Source Protocol Fuzzer
- Oculus SSO “Account Linking” bug leads to account takeover on third party websites and inside VR Games/Apps
- Oculus SSO “Account Linking” bug leads to account takeover on third party websites and inside VR Games/Apps
- How to hack your ex-girlfriend’s Facebook account
- Why I Quit My Job at Bugcrowd
- nOtWASP bottom 10: vulnerabilities that make you cry
- Hidden OAuth attack vectors
- Introducing Haktrails: A Small CLI Tool Harnessing the Power of SecurityTrails
- Offensive Security Experienced Penetration Tester (OSEP) Review and Exam
- Subdomain takeover: ignore this vulnerability at your peril
- Applying Offensive Reverse Engineering to Facebook Gameroom
- The great SameSite confusion
- A Glossary of Blind SSRF Chains
- Supply Chain Pollution: Hunting a 16 Million Download/Week npm Package Vulnerability for a CTF Challenge
- Supply Chain Pollution: Hunting a 16 Million Download/Week npm Package Vulnerability for a CTF Challenge
- Hacking Chess.com and Accessing 50 Million Customer Records
- Imposter Alert: Extracting and Reversing Metasploit Payloads (Flare-On 2020 Challenge 7)
- We Hacked Apple for 3 Months: Here’s What We Found
- Finding Hidden Files and Folders on IIS using BigQuery
- Beat The Clock: The CSIT InfoSecurity Challenge
- Hacking on Bug Bounties for Four Years
- Perspective is Everything
- Open Sesame: Escalating Open Redirect to RCE with Electron Code Review
- Protecting your apps from link-based vulnerabilities: reverse tabnabbing, broken-link hijacking, and open redirects
- A glimpse at parametric polymorphism in Go: designing a generic bidirectional map
- Leveraging an SSRF to leak a secret API key
- Hacking Starbucks and Accessing Nearly 100 Million Customer Records
- Chaining an IDOR with a business-logic error to achieve critical impact
- Closing the Loop: Practical Attacks and Defences for GraphQL APIs
- Don't Force Yourself to Become a Bug Bounty Hunter
- Abusing HTTP Path Normalization and Cache Poisoning to steal Rocket League accounts
- Same Same But Different: Discovering SQL Injections Incrementally with Isomorphic SQL Statements
- Plugging Git leaks: preventing and fixing information exposure in repositories
- A Tale of Two Formats: Exploiting Insecure XML and ZIP File Parsers to Create a Web Shell
- Expanding the Attack Surface: React Native Android Applications
- Remote Code Execution in Three Acts: Chaining Exposed Actuators and H2 Database Aliases in Spring Boot 2
- Low-Hanging Apples: Hunting Credentials and Secrets in iOS Apps
- From checkra1n to Frida: iOS App Pentesting Quickstart on iOS 13
- Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty
- Analysis of CVE-2019-14994 - Jira Service Desk Path Traversal leads to Massive Information Disclosure
- Cracking my windshield and earning $10,000 on the Tesla Bug Bounty Program
- Discovering a zero day and getting code execution on Mozilla's AWS Network
- Summary of dotGo 2019
- Discovering a zero day and getting code execution on Mozilla's AWS Network
- Gaining access to Uber's user data through AMPScript evaluation
- Reading ASP secrets for $17,000
- Access control in Go: a primer for Java developers
- Defer: sweet, but no syntactic sugar
- The $12,000 Intersection between Clickjacking, XSS, and Denial of Service
- Hacking a Massive Steam Scamming and Phishing Operation for Fun and Profit
- Exploiting Directory Traversal to View Customer Credit Card Information on Yahoo's Small Business Platform
- How I gained access to chef, docker, AWS, and MongoDB instances in a single request
- Permanent account takeover on Yahoo's Small Business platform
- How I could've taken over the production server of a Yahoo acquisition through command injection
- Eradicating image authentication injection from the entire internet
- How I stole the identity of every Yahoo user
- High frequency security bug hunting: 120 days, 120 bugs
- High frequency security bug hunting: 120 days, 120 bugs
- Using ngrok to proxy internal servers in restrictive environments
- Abusing URL Shortners to discover sensitive resources or assets
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions
- Security for young people in Australia
- Exploiting Markdown Syntax and Telescope Persistent XSS through Markdown (CVE-2014-5144)