What is Detectify?
Detectify Labs
A security research blog
App Security
Writeups
How to
Crowdsource
How To Hack Web Applications in 2022: Part 1
Detectify
Ethical Hacking
hacking
web apps
XSS
Most read articles
How I made LastPass give me all your passwords
»
Hacking Slack using postMessage and WebSocket-reconnect to steal your precious token
»
Chrome Extensions – AKA Total Absence of Privacy
»
New tool release: Discovering the origin host to bypass web application firewalls
Ethical Hacking
featured
hakluke
WAF
web application firewall
Get research and tips from Detectify security experts and the Crowdsource hacker community
Subscribe to the Detectify Monthly Round-up
Detectify awarded its biggest bounty ever during the height of Log4j
Detectify
Detectify Crowdsource
log4j
How I found the Grafana zero-day Path Traversal exploit that gave me access to your logs
Detectify Crowdsource
featured
path traversal
zero day
Hakluke: Creating the Perfect Bug Bounty Automation
automation
bug bounty
featured
10 Types of Web Vulnerabilities that are Often Missed
bug bounty
Detectify Crowdsource
Farah Hawa
featured
hakluke
Hacking CloudKit – How I accidentally deleted your Apple Shortcuts
Cloudkit
Detectify Crowdsource
Frans Rosén
iOS
How blue teams can defend against Dependency Confusion and other novel supply chain attacks
dependency confusion
Detectify Crowdsource
supply chain attacks
Go Fuzz Yourself – How to Find More Vulnerabilities in APIs Through Fuzzing [Whitepaper download]
api fuzzing
api security
pentesting
How to set up Docker for Varnish HTTP/2 request smuggling
request smuggling
1
2
3
…
10
Next »
Start securing your web apps with tech powered by Detectify Crowdsource hackers
Start a 2-week free trial of Detectify and go hack yourself