5 mistakes to avoid on the bug bounty programImprove your testing accuracy and get the most out of your findingsNov 10, 2022Nov 10, 2022
picoCTF 2019 — JS Kiddie writeup (850 points)Solving two picoCTF web challenges for 850 points in totalOct 24, 2019A response icon2Oct 24, 2019A response icon2
How to find vulnerabilities on OS X?Read my research to know why I got paid $3k from FacebookSep 15, 2019Sep 15, 2019
Hacking home routers from the InternetHackers can get access to your router with DNS Rebinding attackSep 12, 2019Sep 12, 2019
Puzzle hidden in the bookThe story of assembly code hidden in the book cover.Sep 10, 2019Sep 10, 2019
Firefox and Burp SuiteThe most secure configuration for pentesters and bug bounty huntersSep 5, 2019Sep 5, 2019
Published inAuth0 EngineeringDetecting secrets in source codeWe’re open-sourcing a new security tool called Repo Supervisor.Jun 12, 2017A response icon2Jun 12, 2017A response icon2