Natan Hailublog.geezsecurity.com·Mar 15, 2024Welcome 101This is Page where i publish my write-ups and Bug Bounty Reports. Have Fun😊!DiscussCTF
Awais Sajidblackdiamond.hashnode.dev·Jan 12, 2024The World of Google Dorks: Unearthing the Hidden WebHave you ever wondered about the secret side of the internet, the part that’s not indexed by regular search engines? Enter the world of Google Dorks, a fascinating realm where savvy users can uncover hidden information and potential vulnerabilities w...Discuss#cybersecurity
prabhudarshan samalcybercruxprabhu.hashnode.dev·Dec 17, 2023Cross-site scripting(XSS) RemediationApplications of cross-site scripting:- An attacker that uses a cross-site scripting flaw can usually do the following: Assume the identity of the victim user. Execute every action that the user is capable of. Read any data that the user has permissio...DiscussWAPT
Arshan DabirsiaghiforPixee Blogblog.pixee.ai·Sep 19, 2023Breaking down the Node.js sandbox bypass CVE-2023-30587Turns out, a lot of people want to try to safely run untrusted code, and that's hard. Pixee Engineer Matt Austin (@mattaustin) recently found a bypass of the new and experimental Node.js sandbox in versions before 20.3.1, and it just received a $3K a...Discuss·2 likes·690 readsSecurity
Otmane Riadnexteventideas.hashnode.dev·Aug 13, 2021Poly Network Hacker Offered $500,000 To Return Stolen TokensHome/bug bounties_/_Poly Network Hacker Offered $500,000 To Return Stolen Tokens bug bountiesbug bountycryptocurrenciesCryptocurrencyCyberCrimeeCommerceePaymentESETExchangehackerLegalMarketingPoly NetworkRegulationSecuritySecurity Managementwhite hat...DiscussSecurity