What is Detectify?

Detectify Labs

A security research blog

SSRF vulnerabilities and where to find them

Detectify Detectify Crowdsource Ethical Hacking hakluke server-side request forgery SSRF

How To Hack Web Applications in 2022: Part 2

bug bounty Detectify Detectify Crowdsource Ethical Hacking hakluke XSS
Get research and tips from Detectify security experts and the Crowdsource hacker community Subscribe to the Detectify Monthly Round-up

Module disclosures now available for hackers on Detectify Crowdsource

bug bounty Detectify Detectify Crowdsource Ethical Hacking module disclosures

Common Security Vulnerabilities in Core AWS Services: Exploitation and Mitigation

Amazon web services AWS aws attack AWS security assessment AWS services Detectify

Account hijacking using “dirty dancing” in sign-in OAuth-flows

bug bounty Detectify Crowdsource Frans Rosén OAuth postmessage XSS

Hack with ‘goodfaith’ – A tool to automate and scale good faith hacking

Detectify Detectify Crowdsource Ethical Hacking goodfaith

How to: Look for TLS private keys on Docker Hub

Detectify Detectify Labs docker

Leveraging AWS QuickSight dashboards to visualize recon data

AWS QuickSight bug bounty Detectify

How To Hack Web Applications in 2022: Part 1

Detectify Ethical Hacking hacking web apps XSS

New tool release: Discovering the origin host to bypass web application firewalls

Ethical Hacking featured hakluke WAF web application firewall
Start securing your web apps with tech powered by Detectify Crowdsource hackers Start a 2-week free trial of Detectify and go hack yourself