Cross-site request forgery: The ultimate Bug Bounty guide to exploiting CSRF vulnerabilitiesRead More ->
Building an Android Bug Bounty lab: the ultimate guide to configuring emulators, real devices, proxies and other mobile hacking tools (featuring Magisk, Burp, Frida)Read More ->
Recon Series #6: Excavating hidden artifacts with Wayback Machine and other web-archive toolsRead More ->
Recon series #4: Port scanning – uncovering attack vectors by revealing open ports and hidden servicesRead More ->
The art of payload obfuscation: how to mask malicious scripts and bypass defence mechanismsRead More ->