💻 Challenge yourself in 2024 justCTF online teaser: 2024.justctf.team Sponsored by: HexRays - get 20% off for IDA pro training sessions with exclusive code BBRE20: bbre.dev/hexrays Trail of Bits: cutt.ly/veucZatb OtterSec: cutt.ly/leucL7cz SECFORCE: cutt.ly/5eoKRyNL
@princewilliam78765 ай бұрын
Where I can learn more about namespace tokenizor and parser
@BugBountyReportsExplained5 ай бұрын
look for mutation xss. Articles by Michał Bentkowski are great. Also, recently in BBRE Premium I covered a talk about it
@Zizo81825 ай бұрын
Thanks for sharing
@eduardopereira27183 ай бұрын
really cool video. thanks
@Username82815 ай бұрын
Amazing channel. Does anyone know any similar channels?
@kuroketsueki90595 ай бұрын
Nahamsec but BBRE is more detailed IMO
@PhilocyberWithRichie5 ай бұрын
No fucking way you have a Mate behind you!! hahaha you are great dude! Good video thanks for sharing!
@BugBountyReportsExplained5 ай бұрын
Mate is now my necessary equipment for work😏
@monKeman4955 ай бұрын
is preflight request with strict referer or sop policy before post or put request can thwart the payload ?
@BugBountyReportsExplained5 ай бұрын
thwart?
@monKeman4955 ай бұрын
@@BugBountyReportsExplained sorry it's stop , in my case program use put method for adding information to account but put method block the cors request .so i tried using __method=get and some other tricks like using in with origin set with src but no luck
@steiner2545 ай бұрын
nice!
@Quantum_Playz785 ай бұрын
2nd view × 2nd comment × 2nd liked = 1 subscriber. Fact I already subscribed your channel more than a year.
@zzzzzzzzZzZZzzzaZzz5 ай бұрын
Thanks for your report and efforts. Unfortunately, the vulnerability has already been reported and thus your report will be marked as duplicate