|
You are here |
labs.watchtowr.com | ||
| | | | |
blog.thalium.re
|
|
| | | | | [AI summary] The blog post discusses the author's experience in vulnerability research and exploitation targeting Steam and its related products, including Steam Link and Remote Play. It covers various vulnerabilities such as format string vulnerabilities, request forgery, heap overflows, and a remote code execution (RCE) exploit. The author also details their interactions with HackerOne and Valve, highlighting the challenges in getting timely responses and the eventual resolution of the reported issues. | |
| | | | |
devco.re
|
|
| | | | | Bug Bounty Hunting from Pentest View, and How to Find Remote Code Execution and Someone's Backdoor on Facebook Server... | |
| | | | |
www.writesoftwarewell.com
|
|
| | | | | This post explains how to work with HTTP requests in Rails, covering the request object and important methods like path, headers, ip, and others. | |
| | | | |
santandersecurityresearch.github.io
|
|
| | | The public blog of Santander Cyber Security Research | ||