Ever been rejected on bug bounty? Well send me your reports to give them a second chance. This includes, but is not limited to - XSS, SQL Injection, Code Execution, Deface, Login Bypass and much more.
-
Updated
Jun 8, 2018 - CSS
Ever been rejected on bug bounty? Well send me your reports to give them a second chance. This includes, but is not limited to - XSS, SQL Injection, Code Execution, Deface, Login Bypass and much more.
Assignments for COSC3371 Cybersecurity taken at the University Of Houston
This repository is a collection of vulnerable code examples for Vert.X.
🎯 List of publicly disclosed application vulnerabilities that I found, reported and were attributed to me.
Application Security Vulnerability Findings, Exploits & OWASP Contributions
Vulnerable Webserver program for Exploitation. Exploits can be found in WEBSERVER_EXPLOIT repository.
All Things Open is the largest "Open" technology event on the east coast.
Old project. A Spring MVC web application with a XML configuration. Vulnerabilities are present.
PowerShell Webserver Security Report
Latest trends and updates in Cyber Security. Also how things work in Cyber Security
Aplicación de escritorio para el análisis de proyectos
Hi!, this is my blog where I will post all my notes about my everyday learning, thanks for being here.
# CVE-2023-29489 exploit
Add a description, image, and links to the vulnerabilities topic page so that developers can more easily learn about it.
To associate your repository with the vulnerabilities topic, visit your repo's landing page and select "manage topics."