Avatar
🗣️

Organizations

Popular posts

  1. While modern defenses have made CSRF vulnerabilities more challenging to exploit, emerging techniques still pose significant threats
    Author: Luca FamĂ 

    CSRF SameSite Cookie Path Traversal

  2. Let’s take a look at the most common OAuth2 misconfigurations that can lead to vulnerabilities
    Author: Luca FamĂ 

    oauth misconfigurations authorization csrf

  3. Exploring security risks in a ‘Secure by Design’ and modern transport protocol
    Author: Luca FamĂ 

    QUIC HTTP/3 protocol impersonation DNS

  4. Legit features often turn into something unexpected: an Insomni’hack Teaser 2024 challenge writeup
    Author: Cesare Pizzi

    Reverse engineering ctf dot net R2R

  5. RSA is an old but still secure public-key cryptosystem. However we need to know how it works to avoid mistakes that could introduce vulnerabilities..
    Author: Luca FamĂ 

    rsa crypto math

  6. Inside the Hex-Rays CTF Challenge and the “mysteries” of RSA
    Author: Cesare Pizzi

    ctf reversing crypto rsa

Post activity