Hunting for blind XSS vulnerabilities: A complete guide
https://www.intigriti.com/researchers/blog/hacking-tools/hunting-for-blind-cross-site-scripting-xss-vulnerabilities-a-complete-guide
https://www.intigriti.com/researchers/blog/hacking-tools/hunting-for-blind-cross-site-scripting-xss-vulnerabilities-a-complete-guide
Intigriti
Hunting for blind XSS vulnerabilities: A complete guide
Cross-site scripting (XSS) vulnerabilities are quite common and fun to find. They also carry great impact when chained with other vulnerabilities. But there's another variant of this vulnerability typ...
❤2👍1
Bypassing File Upload Restrictions To Exploit Client-Side Path Traversal · Doyensec's Blog
https://blog.doyensec.com/2025/01/09/cspt-file-upload.html
https://blog.doyensec.com/2025/01/09/cspt-file-upload.html
Intigriti Bug Bytes #220 - January 2025 🚀
https://www.intigriti.com/researchers/blog/bug-bytes/bug-bytes-220-january-2025
https://www.intigriti.com/researchers/blog/bug-bytes/bug-bytes-220-january-2025
Intigriti
Intigriti Bug Bytes #220 - January 2025 🚀
Welcome to the first Bug Bytes of 2025! Each month, we team up with bug bounty experts to bring you insights, platform updates, new programs, and upcoming community events—all to help you find more b...
A Journey of Limited Path Traversal To RCE With $40,000 Bounty!
https://medium.com/@HX007/a-journey-of-limited-path-traversal-to-rce-with-40-000-bounty-fc63c89576ea
https://medium.com/@HX007/a-journey-of-limited-path-traversal-to-rce-with-40-000-bounty-fc63c89576ea
Medium
A Journey of Limited Path Traversal To RCE With $40,000 Bounty!
#Introduce Myself:
👍1
How a Business Logic Vulnerability Led to Unlimited Discount Redemption
https://www.hackerone.com/vulnerability-management/stripe-business-logic-error-bug
https://www.hackerone.com/vulnerability-management/stripe-business-logic-error-bug
HackerOne
How a Business Logic Vulnerability Led to Unlimited Discount Redemption
Learn about the impact, severity, and a real-world example of business logic vulnerabilities.
How a Cross-Site Scripting Vulnerability Led to Account Takeover
https://www.hackerone.com/vulnerability-management/xss-deep-dive
https://www.hackerone.com/vulnerability-management/xss-deep-dive
HackerOne
How a Cross-Site Scripting Vulnerability Led to Account Takeover
Cross-site scripting (XSS) is the number one most common security vulnerability. Learn what XSS is, its impacts, and how to prevent it.
❤1
01. /js/config.js
02. /js/credentials.js
03. /js/secrets.js
04. /js/keys.js
05. /js/password.js
06. /js/api_keys.js
07. /js/auth_tokens.js
08. /js/access_tokens.js
09. /js/sessions.js
10. /js/authorization.js
11. /js/encryption.js
12. /js/certificates.js
13. /js/ssl_keys.js
14. /js/passphrases.js
15. /js/policies.js
16. /js/permissions.js
17. /js/privileges.js
18. /js/hashes.js
19. /js/salts.js
20. /js/nonces.js
21. /js/signatures.js
22. /js/digests.js
23. /js/tokens.js
24. /js/cookies.js
25. /js/topsecr3tdonotlook.js
Please open Telegram to view this post
VIEW IN TELEGRAM
👍13👨💻2
Which curl option disables SSL/TLS certificate verification?
Anonymous Quiz
46%
-no-security-certificate
26%
-s
22%
-k
6%
-u
Which of the following tools can be used for advanced GraphQL API fuzzing and testing?
Anonymous Quiz
9%
sqlmap
48%
GraphQLMap and GraphQL Voyager
36%
Burp Suite and InQL
7%
Metasploit Framework
Zero Day Exploit THB .pdf
236.7 KB
🔖 اصطلاح "Zero-Day" زمانی استفاده میشود که تیمهای امنیتی از آسیبپذیری نرمافزار خود بیاطلاع باشند و "0" روز فرصت داشته باشند تا روی یک پچ امنیتی یا بهروزرسانی برای رفع مشکل کار کنند. این اصطلاح معمولاً با مفاهیم آسیبپذیری، اکسپلویت و تهدید ... .
✍ تهیه شده توسط : تیم ترجمه TryHackBox
Language: persian
✍ تهیه شده توسط : تیم ترجمه TryHackBox
Language: persian
👍5
JavaScript The Definitive Guide - Flanagan.pdf
6.5 MB
JavaScript The Definitive Guide - Flanagan.pdf
👍1
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
site:*.example.com (ext:doc OR ext:docx OR ext:odt OR ext:pdf OR ext:rtf OR ext:ppt OR ext:pptx OR ext:csv OR ext:xls OR ext:xlsx OR ext:txt OR ext:xml OR ext:json OR ext:zip OR ext:rar OR ext:md OR ext:log OR ext:bak OR ext:conf OR ext:sql)
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1