unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Supercharge your vulnerability triage: Our investment in your efficiency
As we step into 2025, many of us are setting resolutions to improve, grow, and achieve more. At Inti...
2025-1-9 00:0:0 | 阅读: 18 |
收藏
|
Intigriti - www.intigriti.com
triage
security
submissions
invest
actionable
Hunting for blind XSS vulnerabilities: A complete guide
Cross-site scripting (XSS) vulnerabilities are quite common and fun to find. They also carry great i...
2025-1-4 00:0:0 | 阅读: 23 |
收藏
|
Intigriti - www.intigriti.com
payload
injection
bypass
inject
The Top 10 Data Breaches of 2024
2024 has been a tumultuous year in cybersecurity with numerous significant data breaches compromisin...
2024-12-24 00:0:0 | 阅读: 32 |
收藏
|
Intigriti - www.intigriti.com
security
responsethe
snowflake
Intigriti 2024 - A year in review
Unsure how much to reward for a reported vulnerability? We've analyzed 640+ bug bounty programs acro...
2024-12-19 00:0:0 | 阅读: 21 |
收藏
|
Intigriti - www.intigriti.com
reward
calculator
640
informed
fairly
Testing JavaScript files for bug bounty hunters
You've with no doubt heard or seen other fellow bug bounty hunters find critical vulnerabilities tha...
2024-12-19 00:0:0 | 阅读: 17 |
收藏
|
Intigriti - www.intigriti.com
coded
hunters
examining
routes
Triage: The not-so-secret hack to impactful bug bounty programs
At the core of every thriving bug bounty platform lies its triage team. These teams evaluate vulnera...
2024-12-19 00:0:0 | 阅读: 14 |
收藏
|
Intigriti - www.intigriti.com
triage
security
intigriti
morale
seamless
Insecure file uploads: A complete guide to finding advanced file upload vulnerabilities
File upload vulnerabilities are fun to find, they are impactful by nature and in some cases even res...
2024-12-14 00:0:0 | 阅读: 18 |
收藏
|
Intigriti - www.intigriti.com
php
malicious
intigriti
Regression testing: The key to ensuring software quality and reliability
Regression testing is a crucial part of software development that ensures new code changes don't neg...
2024-12-12 00:0:0 | 阅读: 17 |
收藏
|
Intigriti - www.intigriti.com
software
retesting
development
security
developers
Broken authentication: 7 Advanced ways of bypassing insecure 2-FA implementations
Two-factor authentication (2FA) has become the go-to solution for strengthening account security. Mo...
2024-12-7 00:0:0 | 阅读: 16 |
收藏
|
Intigriti - www.intigriti.com
bypass
security
idor
The cyber threat landscape part 5: Staying safe with multi-layered defense
Before diving into security controls or implementing bug bounty programs, to first establish a stron...
2024-12-5 00:0:0 | 阅读: 20 |
收藏
|
Intigriti - www.intigriti.com
security
defenses
attackers
threats
Broken authentication: A complete guide to exploiting advanced authentication vulnerabilities
Authentication vulnerabilities are fun to find as they are impactful by nature and often grant unaut...
2024-11-30 00:0:0 | 阅读: 13 |
收藏
|
Intigriti - www.intigriti.com
username
bypass
predictable
The cyber threat landscape part 4: Emerging technologies and their security implications
As organizations continue adopting emerging technologies, they gain immense benefits but also face n...
2024-11-27 00:0:0 | 阅读: 21 |
收藏
|
Intigriti - www.intigriti.com
security
cloud
attackers
blockchain
Crafting your bug bounty methodology: A complete guide for beginners
Bug bounty hunting can seem overwhelming when you're just starting, especially when you are coming f...
2024-11-25 00:0:0 | 阅读: 18 |
收藏
|
Intigriti - www.intigriti.com
hunters
security
competing
strongest
The cyber threat landscape part 3: Evolving attack techniques and tactics
As cyber attackers refine their skills, their methods evolve to exploit vulnerabilities in innovativ...
2024-11-21 00:0:0 | 阅读: 16 |
收藏
|
Intigriti - www.intigriti.com
ransomware
evolving
attackers
threats
Complete guide to finding more vulnerabilities with Shodan and Censys
You've probably seen another bug bounty hunter or security researcher find cool bugs using internet...
2024-11-19 00:0:0 | 阅读: 16 |
收藏
|
Intigriti - www.intigriti.com
censys
autonomous
intigriti
favicon
software
SSRF: A complete guide to exploiting advanced SSRF vulnerabilities
SSRF—short for Server-Side Request Forgery—vulnerabilities are amongst one of the most impactful web...
2024-8-1 00:0:0 | 阅读: 15 |
收藏
|
Intigriti - www.intigriti.com
ssrf
bypass
attacker
behalf
Previous
6
7
8
9
10
11
12
13
Next