Explore >> Select a destination


You are here

miparnisariblog.wordpress.com
| | kersed.net
1.7 parsecs away

Travel
| | [AI summary] This article explains Cross-Site Scripting (XSS) attacks, categorizing them into client-side vs server-side and reflected vs stored types, and provides defense strategies such as input validation, output encoding, and secure session management.
| | taeluralexis.com
3.9 parsecs away

Travel
| | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies.
| | victoria.dev
1.9 parsecs away

Travel
| | [AI summary] The article discusses SQL injection and cross-site scripting (XSS) vulnerabilities, emphasizing the importance of securing user input to prevent security breaches by white hat hackers.
| | www.tremolosecurity.com
14.1 parsecs away

Travel
| [AI summary] A blog post discussing a talk on Kubernetes identity management from Google DevFestDC, including a screen cast, slides, and code availability on GitHub.