Sitemap
Pages
Pages
Posts
Posts by category
- Articles
- Blog
- How We Exploited Auth0 Misconfigurations
- RCE via Dependency Confusion Attack
- GraphQL Common Attack Vectors
- SSRF with DNS Rebinding
- SOP vs CORS
- AWS Cognito Misconfigurations
- WebSocket Misconfigurations
- NoSQL Injection
- JSON Injection
- Burp Extension: Authentication Token Obtain and Replace (ATOR)
- How We Bypassed File Upload Restrictions
- Privilege Escalation: Unauthenticated User to Admin
- How We Were Able to Access User Personal Data
- How We Were Able to Fetch Internal Server Resources