What is Detectify?
Detectify Labs
A security research blog
App Security
Writeups
How to
Crowdsource
Common Security Vulnerabilities in Core AWS Services: Exploitation and Mitigation
Amazon web services
AWS
aws attack
AWS security assessment
AWS services
Detectify
Most read articles
How I made LastPass give me all your passwords
»
Hacking Slack using postMessage and WebSocket-reconnect to steal your precious token
»
Chrome Extensions – AKA Total Absence of Privacy
»
Account hijacking using “dirty dancing” in sign-in OAuth-flows
bug bounty
Detectify Crowdsource
Frans Rosén
OAuth
postmessage
XSS
Get research and tips from Detectify security experts and the Crowdsource hacker community
Subscribe to the Detectify Monthly Round-up
Hack with ‘goodfaith’ – A tool to automate and scale good faith hacking
Detectify
Detectify Crowdsource
Ethical Hacking
goodfaith
How to: Look for TLS private keys on Docker Hub
Detectify
Detectify Labs
docker
Leveraging AWS QuickSight dashboards to visualize recon data
AWS QuickSight
bug bounty
Detectify
How To Hack Web Applications in 2022: Part 1
Detectify
Ethical Hacking
hacking
web apps
XSS
New tool release: Discovering the origin host to bypass web application firewalls
Ethical Hacking
featured
hakluke
WAF
web application firewall
Detectify awarded its biggest bounty ever during the height of Log4j
Detectify
Detectify Crowdsource
log4j
How I found the Grafana zero-day Path Traversal exploit that gave me access to your logs
Detectify Crowdsource
featured
path traversal
zero day
Hakluke: Creating the Perfect Bug Bounty Automation
automation
bug bounty
featured
« Previous
1
2
3
4
…
11
Next »
Start securing your web apps with tech powered by Detectify Crowdsource hackers
Start a 2-week free trial of Detectify and go hack yourself