What is Detectify?
Detectify Labs
A security research blog
App Security
Writeups
How to
Crowdsource
How To Hack Web Applications in 2022: Part 2
bug bounty
Detectify
Detectify Crowdsource
Ethical Hacking
hakluke
XSS
Most read articles
How I made LastPass give me all your passwords
»
Hacking Slack using postMessage and WebSocket-reconnect to steal your precious token
»
Chrome Extensions – AKA Total Absence of Privacy
»
Module disclosures now available for hackers on Detectify Crowdsource
bug bounty
Detectify
Detectify Crowdsource
Ethical Hacking
module disclosures
Get research and tips from Detectify security experts and the Crowdsource hacker community
Subscribe to the Detectify Monthly Round-up
Common Security Vulnerabilities in Core AWS Services: Exploitation and Mitigation
Amazon web services
AWS
aws attack
AWS security assessment
AWS services
Detectify
Account hijacking using “dirty dancing” in sign-in OAuth-flows
bug bounty
Detectify Crowdsource
Frans Rosén
OAuth
postmessage
XSS
Hack with ‘goodfaith’ – A tool to automate and scale good faith hacking
Detectify
Detectify Crowdsource
Ethical Hacking
goodfaith
How to: Look for TLS private keys on Docker Hub
Detectify
Detectify Labs
docker
Leveraging AWS QuickSight dashboards to visualize recon data
AWS QuickSight
bug bounty
Detectify
How To Hack Web Applications in 2022: Part 1
Detectify
Ethical Hacking
hacking
web apps
XSS
New tool release: Discovering the origin host to bypass web application firewalls
Ethical Hacking
featured
hakluke
WAF
web application firewall
Detectify awarded its biggest bounty ever during the height of Log4j
Detectify
Detectify Crowdsource
log4j
« Previous
1
2
3
4
…
11
Next »
Start securing your web apps with tech powered by Detectify Crowdsource hackers
Start a 2-week free trial of Detectify and go hack yourself