unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
How I Taught AI to Predict Zero-Days Before They Happened (And Got Paid for Bugs That Didn’t Exist…
2025-11-23 08:23:10 | 阅读: 26 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
gut
feeling
aiyou
yeah
How I Taught AI to Predict Zero-Days Before They Happened (And Got Paid for Bugs That Didn’t Exist…
2025-11-23 08:23:10 | 阅读: 25 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
gut
feeling
exploited
hey
How I Made Burp Suite My IDOR-Finding Robot Butler (And Found 20+ Bugs)
2025-11-23 08:22:57 | 阅读: 34 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
megacorp
coffee
58432
usual
hey
How I Made Burp Suite My IDOR-Finding Robot Butler (And Found 20+ Bugs)
2025-11-23 08:22:57 | 阅读: 11 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
megacorp
coffee
58432
madness
myself
How One Tiny IDOR Created a Digital Domino Effect That Toppled Their Entire Security
2025-11-23 08:22:38 | 阅读: 39 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
cloudsecure
sweater
innocent
cartoons
wool
How One Tiny IDOR Created a Digital Domino Effect That Toppled Their Entire Security
2025-11-23 08:22:38 | 阅读: 7 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
cloudsecure
innocent
sweater
seriously
yeah
Karmic Security — HTB Starting Point: Appointment
Hello and welcome to Starting Point Tier 1! We are officially out of tier zero and are now actually...
2025-11-23 08:21:26 | 阅读: 17 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
injection
database
username
sizewe
tier
Hack the Box Starting Point: Responder
Hello and welcome back to the little Starting Point series I’ve been doing on the HacktheBox main pl...
2025-11-23 08:21:9 | 阅读: 6 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
responder
remote
rfi
network
windows
A Comprehensive Guide to Hunting Bugs in User Registration Features
A Practical Guide to Uncovering Hidden Vulnerabilities in Modern Signup SystemsPress enter or click...
2025-11-23 07:30:57 | 阅读: 21 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
signup
bypass
sensitivity
A Comprehensive Guide to Hunting Bugs in User Registration Features
A Practical Guide to Uncovering Hidden Vulnerabilities in Modern Signup SystemsPress enter or click...
2025-11-23 07:30:57 | 阅读: 32 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
signup
bypass
sensitivity
database
When Reading the Source Code Is the Real Hack: A Web Challenge Story | v1t CTF
Sometimes the best hacking tool is just… reading comprehensionPress enter or click to view image in...
2025-11-15 05:57:48 | 阅读: 18 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
username
client
security
cracking
When Reading the Source Code Is the Real Hack: A Web Challenge Story | v1t CTF
Sometimes the best hacking tool is just… reading comprehensionPress enter or click to view image in...
2025-11-15 05:57:48 | 阅读: 28 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
username
security
client
cracking
Reflected XSS → DVWA Walkthrough: Learn How User Input Can Trigger a Script Execution
2025-11-15 05:56:6 | 阅读: 19 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
payload
attacker
craft
security
victim
SQL Injection: Listing Database Contents on Non-Oracle Databases
UNION-based SQL injection used to enumerate database tables, extract credential columns, dump userna...
2025-11-15 05:55:12 | 阅读: 24 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
injection
database
bwgqeq
When Among Us Meets Academia: An OSINT Challenge That’s Not Sus At All | v1t CTF OSINT Challenge
Finding university acronyms in the most unexpected placesDifficulty: Beginner-Friendly | Category: O...
2025-11-13 13:39:32 | 阅读: 17 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
v1t
acronym
reverse
uit
ho
When Among Us Meets Academia: An OSINT Challenge That’s Not Sus At All | v1t CTF OSINT Challenge
Finding university acronyms in the most unexpected placesDifficulty: Beginner-Friendly | Category: O...
2025-11-13 13:39:32 | 阅读: 8 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
v1t
acronym
uit
reverse
minh
Privilege Escalation From Guest To Admin
Privilege Escalation Guest user escalates To full project access after project visibility is switche...
2025-11-13 13:35:37 | 阅读: 12 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
leaves
yeah
attacker
invited
publicpress
Privilege Escalation From Guest To Admin
Privilege Escalation Guest user escalates To full project access after project visibility is switche...
2025-11-13 13:35:37 | 阅读: 13 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
escalates
attacker
leaves
publicpress
invited
CORS Vulnerability with Trusted Null Origin
2025-11-13 13:34:10 | 阅读: 22 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
strictly
ethical
security
origins
compromises
CORS Vulnerability with Trusted Null Origin
2025-11-13 13:34:10 | 阅读: 8 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
ethical
strictly
security
sizecors
Previous
2
3
4
5
6
7
8
9
Next