InInfoSec Write-upsbyVicky AryanUse these cheatsheets to increase your CTF speed.This cheatsheet contains essential commands I always use in CTFs, THM boxes, and in cybersecurity. Includes commands and tools for…Nov 13, 20235Nov 13, 20235
InOSINT Ambitionbycyb_detective5 simple tricks to quickly analyze a larger list of URLsDuring investigations related to people and companies, investigators often have to deal with long lists of URLs. Here are some examples of…Feb 20, 2024Feb 20, 2024
InInfoSec Write-upsbyOtt3rlyMass Hunting for Leaked Sensitive Documents For Big BountiesDiscover how it is possible to massively hunt for leaked sensitive documents.Dec 11, 20233Dec 11, 20233
InInfoSec Write-upsbyOtt3rlyMass hunting for misconfigured S3 bucketsThe Power of AXIOM Part 5Oct 1, 2023Oct 1, 2023
IamxaliUnveiling Vulnerabilities: Host-header injection in OAuth FunctionalityIntroductionAug 15, 20231Aug 15, 20231
InInfoSec Write-upsbycan1337Bypassing email verification of high-profile tech company ($$$)Hi guys, after almost a year, I thought I should create a new write-up. Today, I’m gonna show you the email verification bypass…Jul 29, 20236Jul 29, 20236