Все публикации

Scanning for hardcoded secrets in source code | Security Simplified

Career and Community building with Bug Bounties | NahamCon Panel

How to conduct a basic security code review | Security Simplified

Launching an InfoSec Career: My six essential tips | Security Simplified

Building a secure application in five steps | Security Simplified

How to learn anything in Computer Science or Cybersecurity | Security Simplified

Building a secure application: the first step | Security Simplified

They are all Injection Vulnerabilities! - Security Simplified

Getting into a Development Career with Seho Lim

Working in AppSec and Getting into Cybersecurity with Ozioma 'Ozy' Aghamba

Chatting with @Hacksplained about Bug Bounties and Infosec Jobs

Attacking Sites Using CSRF - Security Simplified

Intro to CSRF (Cross-Site Request Forgery) - Security Simplified

Hacking banks with race conditions

How to prevent PHP type juggling vulnerabilities

Exploiting PHP Type Juggling Vulnerabilities - Security Simplified

How Attackers Bypass MFA (Multi-Factor Authentication) - Security Simplified

Why Is Validating URLs So Hard?

How to Prevent Open Redirects in your Applications

Hacking SSO: Authentication Bypass by Stealing OAuth Tokens

How to Prevent Command Injections

Intro to Command Injection | Security Simplified

How To Prevent IDORs | Security Simplified

How to Prevent SSRF Vulnerabilities (Server-Side Request Forgery)