Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Exploiting weak configurations in Amazon Cognito (2021)
(
appsecco.com
)
2 points
by
mooreds
on March 14, 2022
|
past
Exploiting CSRF on JSON endpoints with Flash and redirects (2018)
(
appsecco.com
)
1 point
by
tosh
on Sept 13, 2020
|
past
AWS changed its PenTesting permission requirement
(
appsecco.com
)
2 points
by
diaanasxsw
on May 6, 2019
|
past
Open Source Intelligence Gathering 201 (Covering 12 additional techniques)
(
appsecco.com
)
1 point
by
ArtWomb
on Sept 8, 2018
|
past
Breaking Full Disk Encryption from a Memory Dump
(
appsecco.com
)
2 points
by
beefhash
on Aug 4, 2018
|
past
Breaking Full Disk Encryption from a Memory Dump
(
appsecco.com
)
2 points
by
ingve
on Aug 3, 2018
|
past
A penetration tester’s guide to sub-domain enumeration
(
appsecco.com
)
308 points
by
adamnemecek
on Nov 11, 2017
|
past
|
32 comments
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: