unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
5 Ways to hack WordPress targets
这篇文章介绍了如何识别和利用WordPress网站中的常见安全漏洞。内容包括过时版本、暴露配置文件、错误的安全设置、弱密码以及易受攻击的插件和主题。通过工具如WPScan和Google dorking,可以快速发现并测试这些漏洞。文章还鼓励使用自动化工具进行大规模扫描,并建议参与漏洞赏金计划以实践技能。...
2025-2-13 00:0:0 | 阅读: 10 |
收藏
|
Intigriti - www.intigriti.com
wordpress
wp
security
php
Hybrid Pentesting: The Smart Approach to Securing your Assets
文章介绍了Intigriti的Hybrid Pentesting服务,结合传统渗透测试与漏洞赏金模式。该服务时间限制灵活、成本效益高,可快速设置并实时更新进展。通过独特的奖励机制和专家团队支持,帮助企业高效识别漏洞并满足合规需求。...
2025-2-5 00:0:0 | 阅读: 8 |
收藏
|
Intigriti - www.intigriti.com
bounties
security
pentests
intigriti
Creating custom wordlists for bug bounty targets: A complete guide
2025-1-31 00:0:0 | 阅读: 4 |
收藏
|
Intigriti - www.intigriti.com
Power of the collective: Investing in the security researcher community for shared success
Our researcher community is the beating heart of our bug bounty platform, identifying hard-to-find v...
2025-1-30 00:0:0 | 阅读: 4 |
收藏
|
Intigriti - www.intigriti.com
security
ethical
intigriti
invest
Exploiting PDF generators: A complete guide to finding SSRF vulnerabilities in PDF generators
PDF generators are commonly implemented in applications. Developers tend to use these components to...
2025-1-27 00:0:0 | 阅读: 5 |
收藏
|
Intigriti - www.intigriti.com
generators
injection
ssrf
Unwavering support: Your bug bounty journey, our priority
The foundation of a successful partnership is a shared commitment to mutual growth – this is somethi...
2025-1-22 00:0:0 | 阅读: 4 |
收藏
|
Intigriti - www.intigriti.com
security
intigriti
partnership
invest
goals
DORA is here - are you ready?
Today, January 17, 2025, marks a pivotal moment for the EU financial sector as the Digital Operation...
2025-1-17 00:0:0 | 阅读: 5 |
收藏
|
Intigriti - www.intigriti.com
dora
ict
resilience
operational
Open URL redirects: A complete guide to exploiting open URL redirect vulnerabilities
Open URL redirect vulnerabilities are easy to find as they are quite common in applications. This vu...
2025-1-16 00:0:0 | 阅读: 5 |
收藏
|
Intigriti - www.intigriti.com
attacker
bypass
php
security
Innovation in action: Investing in the future of bug bounty
In an industry where security needs evolve as rapidly as the threats themselves, standing still isn'...
2025-1-15 00:0:0 | 阅读: 4 |
收藏
|
Intigriti - www.intigriti.com
security
intigriti
development
innovation
investment
7 Overlooked recon techniques to find more vulnerabilities
Reconnaissance is an important phase in bug bounty and in pentesting in general. As every target is...
2025-1-13 00:0:0 | 阅读: 6 |
收藏
|
Intigriti - www.intigriti.com
proxy
routes
security
ffuf
Intigriti Bug Bytes #220 - January 2025
这篇文章介绍了2025年首个Bug Bytes的内容,包括Altera启动公开漏洞赏金计划、Intigriti CTF挑战赛及工具资源分享。文章还提供了漏洞测试技巧、工具推荐及平台动态更新,旨在帮助研究人员提升技能并发现更多漏洞。...
2025-1-10 00:0:0 | 阅读: 4 |
收藏
|
Intigriti - www.intigriti.com
hunters
intigriti
cheat
goals
Supercharge your vulnerability triage: Our investment in your efficiency
As we step into 2025, many of us are setting resolutions to improve, grow, and achieve more. At Inti...
2025-1-9 00:0:0 | 阅读: 4 |
收藏
|
Intigriti - www.intigriti.com
triage
security
submissions
invest
actionable
Hunting for blind XSS vulnerabilities: A complete guide
Cross-site scripting (XSS) vulnerabilities are quite common and fun to find. They also carry great i...
2025-1-4 00:0:0 | 阅读: 7 |
收藏
|
Intigriti - www.intigriti.com
payload
injection
bypass
inject
The Top 10 Data Breaches of 2024
2024 has been a tumultuous year in cybersecurity with numerous significant data breaches compromisin...
2024-12-24 00:0:0 | 阅读: 17 |
收藏
|
Intigriti - www.intigriti.com
security
responsethe
snowflake
Intigriti 2024 - A year in review
Unsure how much to reward for a reported vulnerability? We've analyzed 640+ bug bounty programs acro...
2024-12-19 00:0:0 | 阅读: 7 |
收藏
|
Intigriti - www.intigriti.com
reward
calculator
640
informed
fairly
Testing JavaScript files for bug bounty hunters
You've with no doubt heard or seen other fellow bug bounty hunters find critical vulnerabilities tha...
2024-12-19 00:0:0 | 阅读: 6 |
收藏
|
Intigriti - www.intigriti.com
coded
hunters
examining
routes
Triage: The not-so-secret hack to impactful bug bounty programs
At the core of every thriving bug bounty platform lies its triage team. These teams evaluate vulnera...
2024-12-19 00:0:0 | 阅读: 4 |
收藏
|
Intigriti - www.intigriti.com
triage
security
intigriti
morale
seamless
Insecure file uploads: A complete guide to finding advanced file upload vulnerabilities
File upload vulnerabilities are fun to find, they are impactful by nature and in some cases even res...
2024-12-14 00:0:0 | 阅读: 6 |
收藏
|
Intigriti - www.intigriti.com
php
malicious
intigriti
Regression testing: The key to ensuring software quality and reliability
Regression testing is a crucial part of software development that ensures new code changes don't neg...
2024-12-12 00:0:0 | 阅读: 4 |
收藏
|
Intigriti - www.intigriti.com
software
retesting
development
security
developers
Broken authentication: 7 Advanced ways of bypassing insecure 2-FA implementations
Two-factor authentication (2FA) has become the go-to solution for strengthening account security. Mo...
2024-12-7 00:0:0 | 阅读: 4 |
收藏
|
Intigriti - www.intigriti.com
bypass
security
idor
Previous
3
4
5
6
7
8
9
10
Next