unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
I took over 10 Million Accounts, Easy API Hacking
I hacked 10 Million+ Accounts and here’s exactly how i did it. Easiest API hacking you’ll ever see.S...
2024-2-28 03:57:6 | 阅读: 77 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
appypie
limits
bac
pii
5accept
The Domino Effect: Strategies to Prevent Supply Chain Cyber Disruptions
SourceIn the interconnected world of digital business operations, the supply chain is not just a log...
2024-2-28 03:56:28 | 阅读: 7 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
security
software
threats
How to Create a Local Kubernetes Cluster: Terraform and Ansible
Kubernetes is a magical technology that can provide your applications scalability, high availability...
2024-2-28 03:56:25 | 阅读: 9 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
kubernetes
containers
cloud
rkt
From Encryption to Decryption: LockBit Ransomware’s Shutdown
TLDR: LockBit ransomware surfaced in 2019, posing a significant threat. However, recent collaborativ...
2024-2-28 03:56:11 | 阅读: 9 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
lockbit
ransomware
acer
demanded
losses
A Comprehensive Guide on GraphQL Testing
GraphQL has taken the API world by storm, offering flexibility and efficiency like never before. But...
2024-2-28 03:55:20 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
inql
database
mutations
injection
Android Hacking: Exploiting Broadcast Receiver
A broadcast receiver in Android is a component that allows the application to receive system-wide me...
2024-2-28 03:54:51 | 阅读: 9 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
receiver
broadcast
extras
oncreate
Pwn College — Talking to Web Walkthrough by Karthikeyan Nagaraj
Sending requests to a Web server via Curl, Netcat, and Python to Access Sensitive files and data | 2...
2024-2-28 03:54:48 | 阅读: 12 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
talking
level38
python
80get
500$: MFA bypass By Race Condition
The article is about a bug I found when I was trying to break the other logic in the software. But i...
2024-2-28 03:54:22 | 阅读: 7 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
exendly
bypass
security
clapping
Tutorial: Shellcode Injection when the buffer is small
A deep dive into mastering shellcode injection when space is not on your side — inspired by a real u...
2024-2-28 03:53:23 | 阅读: 8 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
shellcode
injection
attacker
constraints
A Pen worth 80K (BBP#2)
In 2021, I was testing on some Program, and my brother asked me to fill out his University Applicati...
2024-2-28 03:53:18 | 阅读: 6 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
currency
inr
fee
80k
teacher
Hacking the Dutch Government
Last year, I became interested in bug bounties and saw the Dutch government will mail you swag (ofte...
2024-2-28 03:52:42 | 阅读: 18 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
payload
bodemloket
ffuf
nl
shirt
Web Cache Poisoing leads to ATO (Account takeover)
On the company’s Login page, a simple but very vulnerable page, I started by looking at the response...
2024-2-28 03:52:28 | 阅读: 3 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
thu
2fapi
injections
client
Dorking-Pentesting: Create Your Own Automated Google Dorking Based Pentesting Tools
sourceExplore the intricacies of an automated pentesting tool designed to detect web vulnerabilities...
2024-2-28 03:52:21 | 阅读: 5 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
stumbled
mysteries
injection
Mastering BetterCap: A Beginner’s Guide to Network Attacks and Monitoring
sourceDive into the world of cybersecurity with our beginner’s guide to BetterCap, the Swiss Army kn...
2024-2-28 03:51:45 | 阅读: 5 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
bettercap
network
monitoring
swiss
Mastering the eJPTv Certification: Strategies, Insights, and AI Assistance
Discover effective strategies, personal insights, and how AI can simplify your journey to passing th...
2024-2-28 03:49:13 | 阅读: 8 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
ejptv
skill
thrilling
clap
remarkable
how i made easy information disclosure bugs in graphql
this is a way to find easy information disclosure bugs in any graphql api that uses postgresql datab...
2024-2-28 03:46:34 | 阅读: 8 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
database
injection
databasehi
explait
throught
This is the easiest bug you can find right now.
You have probably clicked after the title, yes it is true! The bug I am going to discuss is the most...
2024-2-28 03:46:33 | 阅读: 14 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
katana
github
extracting
styling
bWAPP — HTML Injection — Reflected (URL)
HTML injection is a type of injection vulnerability that occurs when a user is able to control an in...
2024-2-28 03:46:32 | 阅读: 11 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
injection
victim
attacker
malicious
inject
Windows Security: Using AMSI to Analyze Malicious JavaScript
For our analysis we will user a tool named “Logman” which is developed by microsoft which is a built...
2024-2-28 03:46:30 | 阅读: 16 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
amsitrace
etl
logman
download
c2c
9.3 Lab: Multi-endpoint race conditions | 2024
This lab’s purchasing flow contains a race condition that enables you to purchase items for an unint...
2024-2-28 03:46:13 | 阅读: 14 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
repeater
wiener
jacket
unintended
peter
Previous
35
36
37
38
39
40
41
42
Next