How to read sensitive data via a SOP bypass.
How to find race conditions in source code.
Learn how to find SQL injection while doing source code analysis .
Slack Group Before we get started I have started a slack group dedicated to hacking. We welcome everyone from beginner…
How to hack a Google Firebase Database for easy wins
Use exposed log and configurations files to find credentials and other sensitive information.
Use Broken Link Hijacking to find stored XSS in web applications.
Injection malicious formulas into exported CSV files
Steal AWS credentials via Server Side Request Forgery(SSRF) attacks.
Use SVG images to gain stored XSS via uploading an SVG image.