|
You are here |
mathieu.fenniak.net | ||
| | | | |
www.sjoerdlangkemper.nl
|
|
| | | | | This article describes how cross site request forgery works, how sites defend against it and how to bypass these defenses. | |
| | | | |
www.vlent.nl
|
|
| | | | | ||
| | | | |
bogs.io
|
|
| | | | | CSRF stands for Cross-Site Request Forgery and is one of the most "popular" web application vulnerabilities | |
| | | | |
www.stevejgordon.co.uk
|
|
| | | In this post, I cover the steps required to create and sign a JWT and use it to authenticate a GitHub App built using .NET. | ||