intigriti.com
Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2026-04-22.
Recon 5
SSRF 5
Bug Bounty 4
IDOR 3
JWT 3
XSS 3
AuthZ 2
API Sec 1
AuthN 1
CSRF 1
RCE 1
SQLi 1
SSTI 1
XXE 1
| Date Added | Resource | Excerpt |
|---|---|---|
| 2026-04-22 2026 | Shodan and Censys for beginners: How to find more vulnerabilitiesRecon | Shodan and Censys for beginners: How to find more vulnerabilities |
| 2026-04-22 2026 | Hunting down subdomain takeover vulnerabilitiesRecon | Hunting down subdomain takeover vulnerabilities |
| 2026-04-22 2026 | FFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty HuntersRecon | FFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty Hunters |
| 2026-04-22 2026 | NoSQL Injection: Advanced Exploitation GuideSQLi | NoSQL Injection: Advanced Exploitation Guide |
| 2026-04-22 2026 | Hacking Next.js Targets: Advanced SSRF Exploitation GuideSSRF | Hacking Next.js Targets: Advanced SSRF Exploitation Guide |
| 2026-04-22 2026 | Catflix CTF: Exploiting SSRFs in Next.js MiddlewareSSRF | Catflix CTF: Exploiting SSRFs in Next.js Middleware |
| 2026-04-17 2026 | Broken authentication: 7 Advanced ways of bypassing 2-FA (Intigriti)AuthN | Broken authentication: 7 Advanced ways of bypassing 2-FA (Intigriti) |
| 2026-04-17 2026 | GitHub dorking for beginners: find more vulnerabilities (Intigriti)Recon | GitHub dorking for beginners: find more vulnerabilities (Intigriti) |
| 2026-04-16 2026 | CSRF: Advanced Exploitation Guide - IntigritiCSRF | CSRF: Advanced Exploitation Guide - Intigriti |
| 2026-04-16 2026 | Crafting Your Bug Bounty Methodology: A Complete GuideBug Bounty | Crafting Your Bug Bounty Methodology: A Complete Guide |
| 2026-04-11 2026 | SSTI: Advanced Exploitation Guide | IntigritiRCESSTI | SSTI: Advanced Exploitation Guide | Intigriti |
| 2026-04-11 2026 | Hacker Tools: JWT_ToolJWT | Hacker Tools: JWT_Tool |
| 2026-04-11 2026 | November CTF Challenge: Exploiting JWT vulnerabilities to achieve RCEJWT | November CTF Challenge: Exploiting JWT vulnerabilities to achieve RCE |
| 2026-04-11 2026 | Intigriti: Exploiting JWT vulnerabilities — advanced exploitation guideAPI SecBug BountyJWT | Intigriti: Exploiting JWT vulnerabilities — advanced exploitation guide |
| 2026-04-10 2026 | Exploiting PDF Generators: Complete Guide to SSRFSSRF | Exploiting PDF Generators: Complete Guide to SSRF |
| 2026-04-10 2026 | Recon for Bug Bounty: 8 Essential Tools | IntigritiBug BountyRecon | Recon for Bug Bounty: 8 Essential Tools | Intigriti |
| 2026-04-10 2026 | 31 Bite-Sized Tips and Bug Bounty Resources for 2026Bug Bounty | 31 Bite-Sized Tips and Bug Bounty Resources for 2026 |
| 2026-04-10 2026 | XXE Injection: Advanced Exploitation GuideXXE | XXE Injection: Advanced Exploitation Guide |
| 2026-04-10 2026 | CSP Bypasses: Advanced Exploitation GuideXSS | CSP Bypasses: Advanced Exploitation Guide |
| 2026-04-10 2026 | Hunting for Blind XSS Vulnerabilities: A Complete GuideXSS | Hunting for Blind XSS Vulnerabilities: A Complete Guide |
| 2026-04-10 2026 | Reflected XSS: Advanced Exploitation GuideXSS | Reflected XSS: Advanced Exploitation Guide |
| 2026-04-09 2026 | SSRF: Advanced Exploitation GuideSSRF | SSRF: Advanced Exploitation Guide |
| 2026-04-06 2026 | BugQuest 2026: 31 Days of Broken Access Control | IntigritiAuthZIDOR | BugQuest 2026: 31 Days of Broken Access Control | Intigriti |
| 2026-04-03 2026 | Insecure Direct Object References (IDOR) | Intigriti HackademyIDOR | Insecure Direct Object References (IDOR) | Intigriti Hackademy |
| 2026-04-03 2026 | IDOR: A Complete Guide to Exploiting Advanced IDOR Vulnerabilities | IntigritiIDOR | IDOR: A Complete Guide to Exploiting Advanced IDOR Vulnerabilities | Intigriti |
| 2026-04-03 2026 | Broken Authentication: Advanced Exploitation Guide | IntigritiAuthZ | Broken Authentication: Advanced Exploitation Guide | Intigriti |
| 2024-10-17 2024 | Server-Side Request Forgery (SSRF)SSRF | The content highlights a global security provider trusted by major organizations, utilizing ethical hackers for agile security testing. The emphasis is on a community of ethical hackers who approach security challenges from an attacker's perspective. The provider offers crowdsourced security services to enhance security measures for organizations. |