Hello all. In this video I show you my report to OPPO. Vuln: CRLF +XSS
Купава
00:16:40
Switch Game Holders that blew my mind! Displays for Nintendo Switch
Meme Kanseri Farkındalık Ayı Kapsamında Uzmanından Önemli Uyarılar
How To Convert An Image From One Format To The Other For FREE | Quick & Easy Offline & Online Method
ظلال جديدة وجزيرة مرعبة _تحديث الهالوين 😈 Arise CrossOver Halloween Update"
00:00:00
Фрагмент программы "Уральское времечко" (ОТВ [Екатеринбург], 2000 г.)
Cybersecurity Interview Questions And Answers | Cybersecurity Interview Prep | Invensis Learning
Метафоры в КПТ и коучинге | Алексей Ёжиков
GraphQL - OS Command injection
Self reflect XSS on the portswigger web security academy JWT lab
GraphQL - Chain Introspection with SQLi
Chain File Upload with XSS
Directory Listing - Active scan
Reflect XSS with Content-Type: text/xml
Reflect XSS 1
Dom XSS2
Dom XSS1
Common Files
Login page Brute Force with ffuf
JWT Attack - Exploiting X5U Header injection
JWT attack - Exploiting JKU Header injection
JWT Attack - Exploiting X5C Header
JWT Attack - JWK - JSON Web Key injection
JWT Attack - Weak Key - Secret Brute force with Hashcat
JWT Attack - Secret Brute force with Hashcat
JWT Attack - Signature is not checked
Check Time based SQLi
ჯვრის ტბა
XSS from jpg with Amazon S3 Bucket
From CRLF to XSS on http://yun.oppo.com
s3 Bucket Takeover by me
crlf injection on https://bug.qiwi.com