whoami? Yii survivor How a single 'temporary' debug token exposed an entire distributed network.AttacksAlgorithmsAPIWeb SecurityHacking@syscaptain• Apr 5, 2026Like1452CommentsSave
Using a Smartphone as a BadUSBHow to use an Android Smartphone as a BadUSBBadUSBHackingAttacksAndroidHID@henacanc• Apr 4, 2026Like830CommentsSave
SSRF for the local network reconnaissanceHow to use SSRF for a local network reconnaissance and which impacts have this vulnerabilityHackingBug BountyWeb SecurityAPI@cancahen• Apr 4, 2026Web PentestLike970CommentsSave
Advanced NoSQL InjectionA Comprehensive Practitioner's Guide to Exploitation, Bypasses, and StrategyHackingWeb SecurityBug BountyAttacksNoSQL@henacanc• Apr 4, 2026Like820CommentsSave
GraphQL Hacking: Queries, and Batching Attacks ( web2 focus )Comprehensive guide to GraphQL API hacking in Web2 applications. Learn endpoint discovery, query vulnerabilities, and essential testing tools for bug bounty hunting.GraphQLHackingAttacks@sh1k4ge• Mar 29, 2026Like250CommentsSave