Phishing the anti-phishers: Exploiting anti-phishing tools for internal access |
|
|
|
Identifying vulnerabilities in GitHub Actions & AWS OIDC Configurations |
|
|
|
Exploiting Application Logic to Phish Internal Mailing Lists |
|
|
|
Exploiting GitHub Actions on open source projects |
|
|
|
Using a GitHub app to escalate to an organization owner for a $10,000 bounty |
|
|
|