What is Detectify?

Detectify Labs

A security research blog

Finding an XSS in an HTML-based Android application

Android Ethical Hacking XSS Zoho

Hijacking of abandoned subdomains part 2

DNS Resource Records Hostile Subdomain takeover Microsoft Szymon Gruszecki
Get research and tips from Detectify security experts and the Crowdsource hacker community Subscribe to the Detectify Monthly Round-up

Hostile Subdomain Takeover using Heroku/Github/Desk + more

Desk Github Heroku Hostile Subdomain takeover

Bash vulnerability affecting web servers and many other services

bash

How the celebrity hack could have been done

hack iCloud privacy

The lesser known pitfalls of allowing file uploads on your website

Frans Rosén

Detectify Validation Specification

Detectify validation

5 contexts where the XSS Auditor won’t help you

Auditor bypass XSS

The Story of the Detectify Game

Detectify Detectify Game

Chrome XSS Protection Bias (using Rails)

Chrome XSS
Start securing your web apps with tech powered by Detectify Crowdsource hackers Start a 2-week free trial of Detectify and go hack yourself