cyb_detectiveinOSINT Ambition5 simple tricks to quickly analyze a larger list of URLsDuring investigations related to people and companies, investigators often have to deal with long lists of URLs. Here are some examples of…Feb 20Feb 20
Ott3rlyinInfoSec Write-upsMass Hunting for Leaked Sensitive Documents For Big BountiesDiscover how it is possible to massively hunt for leaked sensitive documents.Dec 11, 20233Dec 11, 20233
Ott3rlyinInfoSec Write-upsMass hunting for misconfigured S3 bucketsThe Power of AXIOM Part 5Oct 1, 2023Oct 1, 2023
IamxaliUnveiling Vulnerabilities: Host-header injection in OAuth FunctionalityIntroductionAug 15, 2023Aug 15, 2023
can1337inInfoSec Write-upsBypassing email verification of high-profile tech company ($$$)Hi guys, after almost a year, I thought I should create a new write-up. Today, I’m gonna show you the email verification bypass…Jul 29, 20236Jul 29, 20236