What is Detectify?

Detectify Labs

A security research blog

Common Security Vulnerabilities in Core AWS Services: Exploitation and Mitigation

Amazon web services AWS aws attack AWS security assessment AWS services Detectify

Account hijacking using “dirty dancing” in sign-in OAuth-flows

bug bounty Detectify Crowdsource Frans Rosén OAuth postmessage XSS
Get research and tips from Detectify security experts and the Crowdsource hacker community Subscribe to the Detectify Monthly Round-up

Hack with ‘goodfaith’ – A tool to automate and scale good faith hacking

Detectify Detectify Crowdsource Ethical Hacking goodfaith

How to: Look for TLS private keys on Docker Hub

Detectify Detectify Labs docker

Leveraging AWS QuickSight dashboards to visualize recon data

AWS QuickSight bug bounty Detectify

How To Hack Web Applications in 2022: Part 1

Detectify Ethical Hacking hacking web apps XSS

New tool release: Discovering the origin host to bypass web application firewalls

Ethical Hacking featured hakluke WAF web application firewall

Detectify awarded its biggest bounty ever during the height of Log4j

Detectify Detectify Crowdsource log4j

How I found the Grafana zero-day Path Traversal exploit that gave me access to your logs

Detectify Crowdsource featured path traversal zero day

Hakluke: Creating the Perfect Bug Bounty Automation

automation bug bounty featured
Start securing your web apps with tech powered by Detectify Crowdsource hackers Start a 2-week free trial of Detectify and go hack yourself