Skip to main content

Explore our questions

-1 votes
1 answer
50 views

Doesn't the fact that local .html files are able to access any file on the users hardddrive make opening them extremely dangerous?

5 votes
1 answer
396 views

Are there documented best practices when federating identity to a third party using OIDC?

1 vote
1 answer
480 views

What are the best security practices when when using VirtualBox on Windows 11 with an old OS?

1 vote
2 answers
767 views

React chars to HTML encode?

0 votes
1 answer
875 views

Attack vectors with encrypted SAML assertion response

3 votes
1 answer
584 views

Account switcher in browser implementation and secure design

1 vote
1 answer
1k views

Hiding metasploit APK after first launch

2 votes
2 answers
478 views

OAuth 2.0 Resource Owner Password Grant - Handling of Access Token Upon Logging Out

13 votes
3 answers
2k views

Installing root certificates by government

1 vote
1 answer
846 views

Unable to See Network Clients during Deauth Capture Issue

1 vote
1 answer
452 views

How to prevent the device from connecting to the original AP?

1 vote
1 answer
2k views

GPG can't decrypt my data because of an invalid packet

0 votes
1 answer
1k views

Man-in-the-Middle Mobile (e.g. Android) Application Tool

1 vote
3 answers
597 views

Plausible PayPal phishing... with no evidence credentials were stolen

Browse more Questions