Clark VossFinding Hidden Gems with Nuclei Templates!Lately, I have been thinking about automation.Aug 23, 20224Aug 23, 20224
Mohamed SalahCross-Platform XSSHello Fellows, In this article, I will demonstrate a vulnerability idea that I have encountered multiple times lately during penetration…Jun 11, 20222Jun 11, 20222
BrownBearSecWhat I learnt from reading 220* IDOR bug reports.IDOR — Insecure Direct Object Reference, abuse of the lack of authentication at every stage.Jan 25, 202211Jan 25, 202211
Gourav DharinInfoSec Write-upsFinding Vulnerable Info Using Google Dorks — Ethical HackingGoogle Dorking is a technique that hackers use to find information that may have been accidentally exposed to the internet.Apr 3, 20223Apr 3, 20223
SwagatinSystem WeaknessHacking JWTThis article is all about pentesting JWT. You can practice all of these techniques on vulnerable target availabe at burp Suite webacademy…Feb 27, 20223Feb 27, 20223
Prajit SindhkarBypassing 403 Protection To Get Pagespeed Admin AccessHello guys👋👋 ,Prajit here from the BUG XS Team, it’s been a long time since my last story, sorry for the delay was held back in exams and…Oct 4, 20218Oct 4, 20218
RavaanGoogle Dork for instant bountiesGoogle dorks that’ll get you instant bounties, proven and tested multiple times.Mar 28, 202211Mar 28, 202211