unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Evolution of Cybersecurity: From Enigma to Quantum Cryptography
This domain has come a long way since the early days of computing when security breaches were relati...
2023-9-25 01:50:46 | 阅读: 5 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
threats
security
encryption
cloud
Revolutionizing Bug Bounty Hunting: Unleashing the AI Advantage with Chat GPT
With Chat GPT, unlock the next phase of bug bounty hunting. Explore the cutting-edge field of AI-dri...
2023-9-25 01:50:27 | 阅读: 5 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
gpt
hunters
security
Revolutionizing Bug Bounty Hunting: Unleashing the AI Advantage with Chat GPT
With Chat GPT, unlock the next phase of bug bounty hunting. Explore the cutting-edge field of AI-dri...
2023-9-25 01:50:27 | 阅读: 19 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
gpt
hunters
security
Exploit Analysis: Request-Baskets v1.2.1 Server-side Request Forgery (SSRF)
Photo by Mika Baumeister on UnsplashIn the world of cybersecurity, vulnerabilities and exploits are...
2023-9-25 01:50:9 | 阅读: 7 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
baskets
ssrf
attacker
leverages
weakness
Exploit Analysis: Request-Baskets v1.2.1 Server-side Request Forgery (SSRF)
Photo by Mika Baumeister on UnsplashIn the world of cybersecurity, vulnerabilities and exploits are...
2023-9-25 01:50:9 | 阅读: 50 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
baskets
ssrf
attacker
leverages
mika
Introduction to External Penetration Testing Assessments
Testing the Waters: A Guide to External Penetration Testing MethodologyCredit:DedMityay — iStockAs p...
2023-9-25 01:50:1 | 阅读: 5 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
client
pentester
engagement
security
Managing AXIOM instances
As you probably learned from the previous part, it is usually a nice thing to have custom wordlists...
2023-9-25 01:42:50 | 阅读: 11 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
axiom
wordlists
machine
backup
assetnote
Core Functionality of AXIOM
Hello Infosec Community!This is the second part of the AXIOM series. In this post, I will discuss th...
2023-9-25 01:42:49 | 阅读: 10 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
axiom
puredns
cloud
yahoo
spinup
The Introduction to AXIOM
Hello Infosec Community!I have been in the Bug Bounty world for a while and I would like to share my...
2023-9-25 01:42:45 | 阅读: 12 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
axiom
cloud
security
pry0cc
Reverse Search IDOR approach to Exposure of all Organizational Sensitive Information.
IDORs Everywhere.Alright people, let’s do this one last time.I’m Manav Bankatwala, and I’m a securit...
2023-9-25 01:41:0 | 阅读: 14 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
corpid
siteid
victim
idor
attacker
22.6k+ GitHub Stars Note-Taking App Hit by XSS Vulnerability
Every digital creation has flaws, and in this blog, we’ll look at a recent discovery that shook the...
2023-9-18 13:13:18 | 阅读: 19 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
trilium
trillium
repository
appeared
1337
Find Bugs While Sleeping ? Get Phone Notifications When A Bug Is Found
Hello Everyone!In the last blog I posted about the free VPS setup and got amazing response.So in thi...
2023-9-18 12:59:21 | 阅读: 12 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
webhook
username
pushover
xxxxxxxx
xxxxxx
My debut with a Critical Bug: How I found my first bug (API misconfiguration)
Finally, the day arrived when I could share my own findings, rather than just reading other research...
2023-9-18 12:55:9 | 阅读: 12 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
algolia
caught
patience
beginner
intriguing
[CORS] Easy peasy lemon squeezy
What’s CORS Misconfiguration !?CORS, which stands for Cross-Origin Resource Sharing, is a security f...
2023-9-18 12:53:55 | 阅读: 10 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
tld
tldorigin
vuln
security
attacker
My $1000 Bounty Bug: How I Stopped Companies from Losing Money with an IDOR Flaw
Discover the intriguing tale of how I stumbled upon an IDOR (Insecure Direct Object Reference) vulne...
2023-9-18 12:50:43 | 阅读: 14 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
expense
idor
examfit
reject
approve
Privilege Escalation: How I Earned $500 by Discovering the Ability to Delete Documents as a Student
I recently stumbled upon a fascinating issue while testing Examosis, an educational platform. This i...
2023-9-18 12:49:23 | 阅读: 7 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
examosis
supposed
educational
exciting
rooms
OAuth 2.0 Hacking
OAuth is an open authorization protocol, which allows accessing the resources of the resource owner...
2023-9-18 12:41:19 | 阅读: 14 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
client
victim
attacker
redirecturl
misconfig
TryHackMe — File Inclusion (Using python)
Link: https://tryhackme.com/room/fileincThis room introduces file inclusion vulnerabilities, includi...
2023-9-18 12:40:26 | 阅读: 8 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
payload
php
repattern
dotall
Webinar Pro or Not: The $500 Access Control Bug
Discover how, I uncovered a $500 access control bug allowing unauthorized webinar creation. Learn ab...
2023-9-18 12:29:50 | 阅读: 14 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
webinar
webinars
security
exameet
adventure
Hacking into gRPC-Web
Here is one example payload after base64 decoding it:Hex Output of the PayloadIn Burp Suite:Base64 D...
2023-9-18 11:40:29 | 阅读: 28 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
grpc
payload
coder
burp
protoscope
Previous
55
56
57
58
59
60
61
62
Next