BBRE Premium
  • Case Studies
  • Archive by issues
  • Courses
  • Archive by category
  • Account
Select Page

DevTools #3 – Debugging client-side JavaScript

#59, DevTools

You are unauthorized to view this page.

Bypassing client-side XSS filters

#32, Client-side hacking techniques

You are unauthorized to view this page.

NahamSec talks are on YouTube

#30, Bug Bounty

You are unauthorized to view this page.

How to debug source code to find bugs?

#17

You are unauthorized to view this page.

Recent Posts

  • Client-side vs server-side bugs
  • Finding Vulnerabilities with MRVA CodeQL
  • CSRFing VS Code’s Debug Adapter Protocol
  • API Security Testing using AI in Postman
  • Sources-to-sinks or sinks-to-sources – which approach works better when?

categories

  • AI
  • Articles by Issue
  • Bug Bounty
  • Burp
  • Case Studies
  • Challenges
  • Cheat sheets
  • Client-side hacking techniques
  • Cloud
  • Hacking Techniques
  • Labs
  • Mobile
  • Non-technical
  • Recon
  • Server-side hacking techniques
  • Source code
  • Tools
  • Web3
  • Writeups

tags

.net (2) 2fa (1) account-takeover (10) api (2) aws (4) cache-poisoning (7) cicd (2) cloud (2) codeql (8) cors (3) crypto (1) csrf (7) ctf (6) cve (3) debugging (4) dependency-confusion (1) deserialisation (2) dns (2) free (271) ghactions (3) graphql (5) idor (2) java (7) js (17) json (2) learning (2) mongodb (1) nuclei (1) path-traversal (2) postmessage (2) premium (122) proto-pollution (4) python (4) qa (1) rails (2) rce (14) regex (3) request-smuggling (5) rpc (1) ruby (3) salesforce (2) secrets (5) semgrep (3) session (1) sqli (5) ssrf (18) ssti (1) talks (6) terminal (4) unicode (1) urls (5) vscode (2) waf (4) web3 (7) websockets (3) wordpress (3) xml (2) xss (25)

Categories

  • Facebook
  • X
© Bug Bounty Reports Explained Grzegorz Niedziela 2022. Company registration number: PL6751745962