Secret starts with analyzing web source to recover a secret token from older …
Sep 28, 2022
·
12 min readAbusing JWT key identifier and breaking out of a Docker container
Aug 07, 2021
·
10 min readChaining XSS, SSRF, and deserialization vulnerabilities to get RCE
Jun 09, 2021
·
13 min read