- Bugbounty 2
- Pentesting 2
- Analyzing JS Secrets 1
- Authorizations Issues 1
- Autorize 1
- Burp Suite 1
- CSV Injection 1
- CSV Payloads 1
- Chrome Dev Tools 1
- Dev tools Bugbounty 1
- Firefox Dev tools 1
- Firefox Extension 1
- Firefox Multicontainers 1
- Formula Injection 1
- Invalidate JWT 1
- JWT Vulnerabilities 1
- JWT attacks 1
- JavaScript 1
- Request Highlighters 1
- Revoke Access Tokens 1
- Secrets in JS 1
- Web Assessments 1
Bugbounty
Authorization Checks Made Easy
Although its not new thing to blog about but I am sure, it will help out most of the security analyst and bug bounty people out there looking for authorization issues
The Blend of Developer Tools into Security Assessments
Pentesting
Authorization Checks Made Easy
Although its not new thing to blog about but I am sure, it will help out most of the security analyst and bug bounty people out there looking for authorization issues
The Blend of Developer Tools into Security Assessments
Analyzing JS Secrets
Finding Gems in JavaScript using Dumpster Diver
From my past experience, I realized the extensive use of JavaScript in modern applications. Most of the applications front-end logic is driven using JavaScript.
Autorize
Authorization Checks Made Easy
Although its not new thing to blog about but I am sure, it will help out most of the security analyst and bug bounty people out there looking for authorization issues
Burp Suite
Authorization Checks Made Easy
Although its not new thing to blog about but I am sure, it will help out most of the security analyst and bug bounty people out there looking for authorization issues
CSV Injection
CSV Formula Injection
Another common security issue which is found these days is CSV injection(CSV - Comma Separated Value). Recently I came across a web application which had this bug and I could not stop myself from writing this blogpost.
CSV Payloads
CSV Formula Injection
Another common security issue which is found these days is CSV injection(CSV - Comma Separated Value). Recently I came across a web application which had this bug and I could not stop myself from writing this blogpost.
Chrome Dev Tools
Back to Top ↑Dev tools Bugbounty
Back to Top ↑Firefox Dev tools
Back to Top ↑Firefox Extension
Authorization Checks Made Easy
Although its not new thing to blog about but I am sure, it will help out most of the security analyst and bug bounty people out there looking for authorization issues
Firefox Multicontainers
Authorization Checks Made Easy
Although its not new thing to blog about but I am sure, it will help out most of the security analyst and bug bounty people out there looking for authorization issues
Formula Injection
CSV Formula Injection
Another common security issue which is found these days is CSV injection(CSV - Comma Separated Value). Recently I came across a web application which had this bug and I could not stop myself from writing this blogpost.
Invalidate JWT
Back to Top ↑JWT Vulnerabilities
Back to Top ↑JWT attacks
Back to Top ↑JavaScript
Finding Gems in JavaScript using Dumpster Diver
From my past experience, I realized the extensive use of JavaScript in modern applications. Most of the applications front-end logic is driven using JavaScript.
Request Highlighters
Authorization Checks Made Easy
Although its not new thing to blog about but I am sure, it will help out most of the security analyst and bug bounty people out there looking for authorization issues
Revoke Access Tokens
Back to Top ↑Secrets in JS
Finding Gems in JavaScript using Dumpster Diver
From my past experience, I realized the extensive use of JavaScript in modern applications. Most of the applications front-end logic is driven using JavaScript.
Web Assessments
Authorization Checks Made Easy
Although its not new thing to blog about but I am sure, it will help out most of the security analyst and bug bounty people out there looking for authorization issues