Fastly Subdomain Takeover $2000
Fastly Subdomain Takeover $2000 Bug Bounty — From zero to HERO by Alexandar Thangavel AKA ValluvarSploit WHOAMI My name is …
Read MoreAppSec Tales X | SAML
AppSec Tales X | SAML by Karol Mazurek Application Security Testing of the SAML protocol guidelines. INTRODUCTION The article describes …
Read MoreAndroid Pentesting 101 — Part 3
Android Pentesting 101 — Part 3 by Vaibhav Lakhani and Dhir Parmar Welcome to Part 3 of Android Pentesting. This …
Read MoreCybersecurity Survey of LoRa and LoRWAN Industrial Radio
Cybersecurity Survey of LoRa and LoRWAN Industrial Radio By Leonard Jacobs, M.S. in Cybersecurity Technology, CISSP, CSSA This is the …
Read MoreIndustrial Control System Cybersecurity Threat Hunting
Industrial Control System Cybersecurity Threat Hunting By Leonard Jacobs, M.S. in Cybersecurity Technology, CISSP, CSSA Cyber threat hunting is the …
Read MoreNot usual CSP bypass case
Not usual CSP bypass case by Karol Mazurek INTRODUCTION During one of the penetration tests, I managed to chain three …
Read MoreA Pentester's Guide to JavaScript Apps
A Pentester's Guide to JavaScript Apps by Gilad David Maayan JavaScript is a programming language that began as a simple …
Read MoreAndroid Pentesting 101 — Part 2
Android Pentesting 101 — Part 2 by Vaibhav Lakhani and Dhir Parmar Welcome to Part 2 of Android Pentesting. This …
Read MoreKERnano : The No-Install Pen Testing Tool (for Windows & Linux)
KERnano : The No-Install Pen Testing Tool (for Windows & Linux) by Ash Noor, aka ryn0f1sh Hello Internet, …
Read MoreAndroid Pentesting 101 — Part 1
Android Pentesting 101 — Part 1 by Vaibhav Lakhani and Dhir Parmar Welcome to this new series of Android Pentesting. …
Read More