What is Detectify?
Detectify Labs
A security research blog
App Security
Writeups
How to
Crowdsource
Module disclosures now available for hackers on Detectify Crowdsource
bug bounty
Detectify
Detectify Crowdsource
Ethical Hacking
module disclosures
Most read articles
How I made LastPass give me all your passwords
»
Hacking Slack using postMessage and WebSocket-reconnect to steal your precious token
»
Chrome Extensions – AKA Total Absence of Privacy
»
Common Security Vulnerabilities in Core AWS Services: Exploitation and Mitigation
Amazon web services
AWS
aws attack
AWS security assessment
AWS services
Detectify
Get research and tips from Detectify security experts and the Crowdsource hacker community
Subscribe to the Detectify Monthly Round-up
Account hijacking using “dirty dancing” in sign-in OAuth-flows
bug bounty
Detectify Crowdsource
Frans Rosén
OAuth
postmessage
XSS
Hack with ‘goodfaith’ – A tool to automate and scale good faith hacking
Detectify
Detectify Crowdsource
Ethical Hacking
goodfaith
How to: Look for TLS private keys on Docker Hub
Detectify
Detectify Labs
docker
Leveraging AWS QuickSight dashboards to visualize recon data
AWS QuickSight
bug bounty
Detectify
How To Hack Web Applications in 2022: Part 1
Detectify
Ethical Hacking
hacking
web apps
XSS
New tool release: Discovering the origin host to bypass web application firewalls
Ethical Hacking
featured
hakluke
WAF
web application firewall
Detectify awarded its biggest bounty ever during the height of Log4j
Detectify
Detectify Crowdsource
log4j
How I found the Grafana zero-day Path Traversal exploit that gave me access to your logs
Detectify Crowdsource
featured
path traversal
zero day
« Previous
1
2
3
4
…
11
Next »
Start securing your web apps with tech powered by Detectify Crowdsource hackers
Start a 2-week free trial of Detectify and go hack yourself