đ§ź USERS:1 FEEDS:2 TWTS:1336 ARCHIVED:87006 CACHE:2816 FOLLOWERS:22 FOLLOWING:14
JĂĄn BulĂk medzi ocenenĂœmi v Martine
V Martine sa 8. mĂĄja odohralo podujatie, ktorĂ© spojilo historickĂș reflexiu s kultĂșrnou spomienkou â Matica slovenskĂĄ si pripomenula 80. vĂœroÄie oslobodenia Slovenska a ukonÄenia druhej svetovej vojny. V sĂdle tejto najstarĆĄej slovenskej kultĂșrnej ustanovizne sa uskutoÄnila slĂĄvnosĆ„ venovanĂĄ osobnostiam, ktorĂ© v Äase vojny so cĆ„ou a odvahou vzdorovali faĆĄizmu. Medzi ocenenĂœmi bol aj JĂĄn BulĂk (1. januĂĄra 1897 KovaÄica â 30. januĂĄra 1942 Mauthause ⊠â Read more
Design system annotations, part 1: How accessibility gets left out of components
The Accessibility Design team created a set of annotations to bridge the gaps that design systems alone canât fix and proactively addresses accessibility issues within Primer components.
The post [Design system annotations, part 1: How accessibility gets left out of components](https://github.blog/engineering/user-experience/design-system-annotations-part-1-how ⊠â Read more
Mastering Rate Limit Bypass Techniques
Learn How Hackers Bypass Rate Limitsâââand How You Can Too
UUIDs: A False Sense Of Security
Hi Hunters, would you like to learn about a broken access control vulnerability that I discovered recently for a client.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/uuids-a-false-sense-of-security-10467497daae?source=rssâ-7b7 ⊠â Read more
$50,000 Bounty: GitHub Access Token
How a hidden token in a desktop app could have compromised one of the worldâs biggest e-commerce platforms
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/50-000-bounty-github-access-token-c29cb6f00182?source=rssâ-7b722bf ⊠â Read more
ïžRecon Automation Like a Pro: My 5-Stage System to Catch More Bugs
â Free Article Link
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/%EF%B8%8Frecon-automation-like-a-pro-my-5-sta ⊠â Read more
Top 10 Ways Hackers Exploit Web Applications (and How to Prevent Them)
Hackers donât wait for big websites. They look for easy mistakes. Letâs fix them before they find yours.
[Continue reading on InfoSec Write- ⊠â Read more
HACK-ERA CTFâââPhase 1 Walkthrough â Read more
$840 Bounty: How I Stole OAuth Tokens from Twitter
A critical OAuth misconfiguration allowed stealing tokens with just a click
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/840-bounty-how-i-stole-oauth-tokens-from-twitter-733f8 ⊠â Read more
đ§ź USERS:1 FEEDS:2 TWTS:1335 ARCHIVED:86994 CACHE:2814 FOLLOWERS:22 FOLLOWING:14
Vim9.1(macOS-arm/Sequaoia) && iTerm2(cask): CursorShape for Insert Mode - How? â Read more
Is there any way to retain vim 7.4 search setting while using vim 9.1? â Read more
Bug Hunting in JS Files: Tricks, Tools, and Real-World POCs
đïžFree Article Link
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/bug-hunting-in-js-files-tricks-tools-and-real-world-pocs-70406e3eb72e?source=rssâ-7 ⊠â Read more
A Guide to SQL Injection Attacks: Hackers Donât Want You to Know This!
Imagine your website as a big toy box filled with treasuresâââlike user info, passwords, or blog postsâââand youâve got a robot helperâŠ
[Contin ⊠â Read more
$100 Bounty: How a Spoofed Email Could Change Any Username on HackerOne
A simple email spoofing trick could let anyone hijack your HackerOne username and profile link
[Continue reading on InfoSec Write-ups »] ⊠â Read more
ïžââïž Unlisted but Not Unseen: How I Found the Admin Panel in a JavaScript Comment
Hey there!đ
[Continue reading on InfoSec Write-ups »](https://infosecwriteu ⊠â Read more
Mastering Linux Part 3: A Beginnerâs Guide to APT and YUM Package Management
A Beginnerâs Guide to APT and YUM Package Management
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com ⊠â Read more
đ§ź USERS:1 FEEDS:2 TWTS:1334 ARCHIVED:86974 CACHE:2839 FOLLOWERS:22 FOLLOWING:14
curl bans âAIâ security reports as Zuckerberg claims weâll all have more âAIâ friends than real ones
Daniel Stenberg, creator and maintainer of curl, has had enough of the neverending torrent of âAIâ-generated security reports the curl project has to deal with. Thatâs it. Iâve had it. Iâm putting my foot down on this craziness. 1. Every reporter submitting security reports on Hackerone for curl now needs to answer this question: âDid you ⊠â Read more
Step 1: Show belly. Step 2: Bite the fool. â Read more
How to setup a Monthly Free VPS for Bug Hunting
In this article, I explained how to setup and use (GitHub CodeSpaces) for bug hunting
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/how-to-setup-a-monthly-free-vps-for-bug-hunting-d4 ⊠â Read more
Revisiting the Past, Hacking the Future
From Invalid Reports to Real Vulnerabilities: The Path to Growth in Hacking
A Penetration Testerâs Journey
Part 4 of âBeginner to Master in LinuxââââA Penetration Testerâs Journey
AI Agents Unleashed: The Rise of Autonomous Systems Transforming Industries
The emergence of AI agents signifies a transformative shift in generative AI, evolving from simple chatbots to sophisticated ⊠â Read more
Is Your App Protected? The Branch API Vulnerability You Need to Know About
$fallback_url is a helpful feature in Branchâs deep linking systemâââuntil someone uses it to redirect your users to phishing ⊠â Read more
A Must-Have Tool for Bug Hunters: Find Open Redirect Vulnerabilities on Linux
Automate open redirection detection, save hours of manual testing, and level up your bug bounty recon game.
[Continue ⊠â Read more
**Query Confusion: How HTTP Parameter Pollution Made the App Spill Secrets **
Hey there!đ
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/query-confusion-how-http-parameter-pollution-made ⊠â Read more
Securing Apache2 + PHP: Practical guide for safer web hosting
A practical security checklist to harden your Apache2 + PHP stack and protect your web applications from common vulnerabilities.
[Continue reading on InfoSec Write-ups »](https:// ⊠â Read more
$2,900 Bounty: Public S3 Bucket Exposure in Shopify
How a Simple S3 Misconfiguration Exposed Private Images Across Shopify Stores and Earned a $2,900 Bounty
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/2-900-bounty-public-s ⊠â Read more
đ§ź USERS:1 FEEDS:2 TWTS:1333 ARCHIVED:86968 CACHE:2847 FOLLOWERS:22 FOLLOWING:14
And on a similar note, cross-post from Mastodon:
What I love about HTML and HTTP is that it can degrade rather gracefully on old browsers.
My website isnât spectacular but I donât think it looks horrible, either. And itâs still usable just fine all the way down to WfW 3.11:
Itâs not perfect, but itâs usable. And that makes me happy. Almost 30 years of compatibilty.
The biggest sacrifice is probably that I donât enforce TLS and that HTTP 1.0 has no Host: header, so no vhosts (or rather, everything must come from the default vhost). (Yes, some old browsers send Host:, even though they predate HTTP 1.1. Netscape does, but not IBM WebExplorer, for example.)
(On the other hand, it might completely suck on modern mobile devices. Dunno, I barely use those. đ€Ș)
Beyond Alert Boxes: Exploiting DOM XSS for Full Account Takeover
Hello Hunters, as you all know, XSS is one of the most common web vulnerabilities, often underestimated but capable of causing severeâŠ
[Continue reading on ⊠â Read more
Hack Any Mobile Phone Remotely
Ethicallyâââbut noteâââthis used to work great with phone under android 10
Containers vs Virtual Machines: Key Differences, Benefits, and Use Cases Explained
Discover the difference between containers and virtual machines, their benefits, and use cases to make smarter inf ⊠â Read more
$2000 Bounty: Stored XSS in GitLab
Exploiting a stored XSS in GitLabâs repository viewer for $2000
Threat Profiling 101: How to Create a Threat Profile
Learn how to create effective threat profiles to identify and prioritize relevant cyber threats for your organization.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/th ⊠â Read more
The Ultimate Guide to Cyber Threat Actors: Exploring Hackers, Hacktivists, and Their Tactics
How can we understand the impact of hackers and hacktivists on global cyberse ⊠â Read more
$1000 Bounty: Account Takeover via Host Header Injection in Password Reset Flow
Free Article Link: Click for free!
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/1000-boun ⊠â Read more
đ§ź USERS:1 FEEDS:2 TWTS:1332 ARCHIVED:86951 CACHE:2881 FOLLOWERS:22 FOLLOWING:14