Request smuggling case study – what more to do other than running existing tools? #72, Case StudiesYou are unauthorized to view this page.
3 Nginx tricks for auth bypass #68, Server-side hacking techniquesYou are unauthorized to view this page.
Severe HTTP request smuggling bug chain #65, Server-side hacking techniquesYou are unauthorized to view this page.
Pause-based desync attacks explained #37, Server-side hacking techniquesYou are unauthorized to view this page.