What is Detectify?

Detectify Labs

A security research blog

How To Hack Web Applications in 2022: Part 2

bug bounty Detectify Detectify Crowdsource Ethical Hacking hakluke XSS

Module disclosures now available for hackers on Detectify Crowdsource

bug bounty Detectify Detectify Crowdsource Ethical Hacking module disclosures
Get research and tips from Detectify security experts and the Crowdsource hacker community Subscribe to the Detectify Monthly Round-up

Common Security Vulnerabilities in Core AWS Services: Exploitation and Mitigation

Amazon web services AWS aws attack AWS security assessment AWS services Detectify

Account hijacking using “dirty dancing” in sign-in OAuth-flows

bug bounty Detectify Crowdsource Frans Rosén OAuth postmessage XSS

Hack with ‘goodfaith’ – A tool to automate and scale good faith hacking

Detectify Detectify Crowdsource Ethical Hacking goodfaith

How to: Look for TLS private keys on Docker Hub

Detectify Detectify Labs docker

Leveraging AWS QuickSight dashboards to visualize recon data

AWS QuickSight bug bounty Detectify

How To Hack Web Applications in 2022: Part 1

Detectify Ethical Hacking hacking web apps XSS

New tool release: Discovering the origin host to bypass web application firewalls

Ethical Hacking featured hakluke WAF web application firewall

Detectify awarded its biggest bounty ever during the height of Log4j

Detectify Detectify Crowdsource log4j
Start securing your web apps with tech powered by Detectify Crowdsource hackers Start a 2-week free trial of Detectify and go hack yourself