The leading provider of crowdsourced cybersecurity solutions purpose-built to secure the digitally connected world...Unleash Ingenuity™
May 1, 2024 • 20 tweets • 2 min read
19 questions @JR0ch17 asks himself when looking through requests in order to identify and document potential vulnerabilities:
1. What methods of authentication are supported?
@JR0ch17 2. Is caching used?
Feb 25, 2024 • 10 tweets • 2 min read
Dupes.
No one likes them.
Here are 8 ways to avoid them👇
1️⃣ Weird Places
Don't just test common features. Explore lesser-known areas like Twitter's ad campaigns or developer tools. This approach leads to unique bug discoveries.