Everything required to test a novel OAuth 2.0 implementation.

What is OAuth? 😕



Ways we can bypass the the filters of the sophos

1.NodeJs application


IDOR -xploitprotocol

What are insecure direct object references (IDOR)?


How to approach a target
How to approach a target
  1. Approaching a target at a…

harshinsecurity

pentester|bug bounty hunter|B.Tech|learner| https://twitter.com/harshinsecurity

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store