You cant be sure
i had found /.well-known/jwks sometime last year... where the private key for a jwk with HS256 algorithm was exposed...
i could sign tokens and impersonate any user
Anybody know good resource where i can find all ip ranges that belong to specific company?
Читать полностью…Goldman Sachs is eligible for bounty with 50 in-scope (sub)domains. That's not big scope.
Читать полностью…hey peeps I found a url for .well-known/apple-developer-merchantid-domain-association ? idk if it's a bug or not as it disclosed a key
Читать полностью…what is internet explorer++?
I didn't buy xss survival course still.
I want that course. (Now for free)
I found a system process which deletes a directory controlled by an unprivileged user, can this be exploited using symlink ?
Читать полностью…Hi , what are the public programms have a big scope ?
IBM AND AT&T a lot of hackers scan it
you can change the duration of subdomain enumeration by changing the number after 'sleep' in this command to your custom seconds
Читать полностью…amass enum -d google.com -o subdomains.txt & sleep 60 ; grep -oE '[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}' subdomains.txt