CSV Injection (Formula Injection) Many web applications allow the user to download content such as templates for invoices or user settings to a CSV file. Many users choose to open the CSV file in ...
Account takeover
Account Takeover Summary Password Reset Feature Password Reset Token Leak Via Referrer Account Takeover Through Password Reset Poisoning Password Reset Via Email Paramet...
Insecure Source Code Management
Insecure source code management Git Example Recovering file contents from .git/logs/HEAD Recovering file contents from .git/index T...
Cobalt strike cheatsheet
Cobalt Strike Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and evaluate mature security programs. Cobalt S...
Api Key Leaks
API Key Leaks The API key is a unique identifier that is used to authenticate requests associated with your project. Some developers might hardcode them or leave it on public shares. Summary ...