Avatar
🗣️

Organizations

Popular posts

  1. Uncovering the unexpected behaviors of JavaScript strings and the challenges posed by UTF-16 encoding
    Author: Luca Famà

    javascript unicode xss utf-16

  2. While modern defenses have made CSRF vulnerabilities more challenging to exploit, emerging techniques still pose significant threats
    Author: Luca Famà

    CSRF SameSite Cookie Path Traversal

  3. Let’s take a look at the most common OAuth2 misconfigurations that can lead to vulnerabilities
    Author: Luca Famà

    oauth misconfigurations authorization csrf

  4. Exploring security risks in a ‘Secure by Design’ and modern transport protocol
    Author: Luca Famà

    QUIC HTTP/3 protocol impersonation DNS

  5. Legit features often turn into something unexpected: an Insomni’hack Teaser 2024 challenge writeup
    Author: Cesare Pizzi

    Reverse engineering ctf dot net R2R

  6. RSA is an old but still secure public-key cryptosystem. However we need to know how it works to avoid mistakes that could introduce vulnerabilities..
    Author: Luca Famà

    rsa crypto math

Post activity