Site Update: Cloudflare
This site now uses CloudFlare
This site now uses CloudFlare
AWS CloudWatch enables monitoring and alerting on cloud events.
AWS Security Hub eases the pain of cloud monitoring
Help protect APIGW from attackers with AWS WAF
AWS CloudTrail is the cornerstone of cloud SECOPS
I share my experience and lessons learned from operating a public bug bounty.
Extract files from tcpdump or wireshark captures
Use this to recover TLS session keys for a java program.
Use mallory proxy to view non-https encrypted mobile traffic
Nearly a year ago, I wrote about an emerging trend I observed with some of the bounty researchers I was interacting with. This screed can be considered an extension of that article. There an emerging trend I’m noticing - I’ve been receiving more messages like the following: Hey , I found Security Vulnerability in your web application ,which can damage site as well as users too.For security purpose can we report vulnerability here,then will i get bounty bounty reward in PayPal or Bitcoin for Security bug ? ...