A comprehensive curated list of available bug bounty amp disclosure programs and write ups git hub djadmin awesome bug bounty a comprehensive curated list of available bug bounty amp discl
Inspired by https github com djadmin awesome bug bounty a list of bug bounty write up that is categorized by the bug nature git hub ngalongc bug bounty reference inspired by https github c
An information security reference that doesn 39 t suck https rmusser net git admin 2 infosec reference for non ms git hosted version git hub rmusser01 infosec reference an information secu
A command kill chain consists of payload delivery code execution on a target system and establishing a command and control c2 channel outside of a network there are many ways to achieve each of these steps for example microsoft office macro for delivery power shell for code execution and http
Sometimes i hear that network address translation nat is considered a security feature unforunately this is not necessarily true and i will try to demonstrate why with a practical example a network positioned attacker can send traffic through a nat gateway to a nat ed system in certain situati
Xxe valid use case this is a nonmalicious example of how external entities are used xml version 1 0 standalone no doctype copyright element copyright pcdata entity c system http www xmlwriter net copyright xml copyright c copyright resource https xmlwriter net x
This is a real story or not that occured in mid 2017 or not about a private program or not on hackerone or not believe me or not but it changed my life i would like to thanks all the people from this company i talked with they were very nice with me very fast to fix the bugs and i always got
Subscribe to get resources directly to your inbox. You won't receive any spam! ✌️