Manipulating AES Traffic using a Chain of Proxies and Hardcoded Keys |
|
|
|
Pwning a Server using Markdown |
|
|
|
Exploiting OAuth: Journey to Account Takeover |
|
|
|
Leveraging XSS to Read Internal Files |
|
|
|
From Android Static Analysis to RCE on Prod |
|
|
|
Bypassing Google Maps API Key Restrictions |
|
|
|
Exploiting JWT - Lack of Signature Verification |
|
|
|