Cross-System Communication: Injection Vulnerabilities InternalsHere is a link for non-membersMar 3Mar 3
“There is no subdomain with no usage” How understanding this rule led to 5 CriticalsHere is how we spotted 5 critical bugs in arabic program on H1Feb 192Feb 192
RegEx Hacking (ReDoS) — Cyborg Cybertalents-challenge write-upWe will go through a Regex introduction, RegEx engines algorithms, then how to hack RegEx engines for DoS (ReDoS)Oct 7, 2024Oct 7, 2024
One IP led to 4 bugs made the company delete the domainHey folks, I’ll explain how I got my first 3 paid bugs with Ahmed Ghazy.Apr 4, 20242Apr 4, 20242
File Upload VulnerabilitiesThese Vulnerabilities arise when the server fails to enforce restrictions on the files uploaded to its system like name, type, content, or…Jun 22, 2023Jun 22, 2023