unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
HTML Injection to Stored XSS and Account Takeover
文章描述了一个复杂的漏洞链攻击过程:通过HTML注入结合jQuery的replaceWith方法,在目标网站上实现了存储型XSS,并最终导致账户接管。攻击者利用Cloudinary图片服务特性,在图片中嵌入恶意代码,窃取用户令牌并接管账户。...
2025-4-30 14:11:41 | 阅读: 8 |
收藏
|
0day Fans - medium.com
pagination
cloudinary
remote
payload
jquery
VibeScamming — From Prompt to Phish: Benchmarking Popular AI Agents’ Resistance to the Dark Side
2025-4-9 13:16:7 | 阅读: 15 |
收藏
|
Over Security - Cybersecurity news aggregator - medium.com
Stored XSS in My Flow To RCE in Opera Browser #2
2025-3-30 00:33:44 | 阅读: 17 |
收藏
|
0day Fans - medium.com
Reflected XSS In Main Search, WAF+Sanitizer Bypass Using 2 Reflections
2025-2-12 23:15:17 | 阅读: 6 |
收藏
|
0day Fans - medium.com
Client Side Path Traversal (CSPT) Bug Bounty Reports and Techniques
2025-1-24 21:2:56 | 阅读: 0 |
收藏
|
0day Fans - medium.com
“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of…
2024-12-16 14:16:44 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - medium.com
“CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack
2024-10-30 21:16:29 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - medium.com
Insider Secrets to Earning $100 to $250 in Bug Bounties
2024-9-3 03:44:26 | 阅读: 1 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - medium.com
“EchoSpoofing” — A Massive Phishing Campaign Exploiting Proofpoint’s Email Protection to Dispatch…
2024-7-29 21:2:29 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - medium.com
Web Application Firewall (WAF) Evasion Techniques
2024-6-6 23:0:41 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - medium.com
Detecting human users: Is there a way to block enumeration, fuzz or web scan?
2024-6-6 23:0:39 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - medium.com
Web Application Firewall (WAF) Evasion Techniques #2
2024-6-6 23:0:38 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - medium.com
PHP SSRF Techniques
2024-6-6 23:0:37 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - medium.com
Building A HackTheBox FluxCapacitor
2024-6-6 23:0:36 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - medium.com
Investigating Surfshark and NordVPN with JA4T
2024-5-18 21:9:29 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - medium.com
Capturing WPA2 handshakes on macOS Catalina with Bettercap
2024-4-7 06:45:31 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - medium.com
“CVE-2024-21388”- Microsoft Edge’s Marketing API Exploited for Covert Extension Installation
2024-3-27 21:46:55 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - medium.com
Evaluate, apply, and sustain security governance principles !
2024-3-19 12:34:9 | 阅读: 4 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - medium.com
“SubdoMailing” — Thousands of Hijacked Major-Brand Subdomains Found Bombarding Users With Millions…
By Nati Tal, Oleg Zaytsev (Guardio Labs)Guardio Labs uncovers a sprawling campaign of subdomain hija...
2024-2-26 22:16:51 | 阅读: 26 |
收藏
|
Over Security - Cybersecurity news aggregator - medium.com
spf
hijacked
malicious
msn
subdomain
Havoc C2 with AV/EDR Bypass Methods in 2024 (Part 1) | by Sam Rothlisberger | Jan, 2024 | Medium
DISCLAIMER: Using these tools and methods against hosts that you do not have explicit permission to...
2024-2-2 23:51:36 | 阅读: 53 |
收藏
|
medium.com
shellcode
payload
stage
c2
victim
Previous
1
2
3
4
5
6
7
8
Next