Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Exploiting weak configurations in Amazon Cognito (2021) (appsecco.com)
2 points by mooreds on March 14, 2022 | past
Exploiting CSRF on JSON endpoints with Flash and redirects (2018) (appsecco.com)
1 point by tosh on Sept 13, 2020 | past
AWS changed its PenTesting permission requirement (appsecco.com)
2 points by diaanasxsw on May 6, 2019 | past
Open Source Intelligence Gathering 201 (Covering 12 additional techniques) (appsecco.com)
1 point by ArtWomb on Sept 8, 2018 | past
Breaking Full Disk Encryption from a Memory Dump (appsecco.com)
2 points by beefhash on Aug 4, 2018 | past
Breaking Full Disk Encryption from a Memory Dump (appsecco.com)
2 points by ingve on Aug 3, 2018 | past
A penetration tester’s guide to sub-domain enumeration (appsecco.com)
308 points by adamnemecek on Nov 11, 2017 | past | 32 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: