#tutorial
Read more stories on Hashnode
Articles with this tag
Escalating a bug in a vulnerable markdown parser to exploit LFI and get RCE ยท Background Hashnode is a blogging platform for developers where you can...
Most of the web and mobile applications these days use OAuth to secure their authorization endpoints. It allows them to easily grant access to their...
Introduction Task Hijacking is a vulnerability that affects the applications running on Android devices due to a misconfiguration in their...
Introduction Google chrome extensions are a bundle of multiple JavaScript, HTML, and CSS files, much like a web app but inside your browser and...
Android app Pentests can become torturous when you don't have the right environment setup.This of course refers to the SSL-pinning that is implemented...
Everybody is familiar with what an XSS is so fast-forwarding it a bit, this is a write-up on how I managed to get an XSS in a PDF generator on an...