thegreyhatgirlinOSINT TeamBeyond the Hype: What CyberSecurity really demands from US!the grit & the grind!!!Oct 131Oct 131
thegreyhatgirlinOSINT TeamSlip in unnoticed and hijack the flow with HTTP Request SmugglingHTTP request smuggling is a sneaky attack where a hacker manipulates how a website handles incoming requests. By carefully crafting their…Oct 2Oct 2
thegreyhatgirlinOSINT TeamThe Silent Intruder: How h2c Smuggling Redefines HTTP/2 SecurityHTTP/2 is the enhanced version of the HTTP/1 protocol, with two modes of operation:Sep 21Sep 21
thegreyhatgirlinT3CHApple Vision Pro’s gaze-tracking flaw lets hackers steal your passwords with just a glancePhoto by Bram Van Oost on UnsplashSep 151Sep 151
thegreyhatgirlinOSINT TeamExploring OAuth 2.0 Vulnerabilities and Bypassing TechniquesTraditionally, applications required users to create unique usernames and passwords for each service. OAuth 2.0 offers a more convenient…Sep 132Sep 132