appsec.fyi · Sources

intigriti.com

27 curated AppSec resources from intigriti.com across 14 topics on appsec.fyi.

intigriti.com

Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2026-04-22.

Date Added Resource Excerpt
2026-04-22 2026Shodan and Censys for beginners: How to find more vulnerabilitiesReconShodan and Censys for beginners: How to find more vulnerabilities
2026-04-22 2026Hunting down subdomain takeover vulnerabilitiesReconHunting down subdomain takeover vulnerabilities
2026-04-22 2026FFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty HuntersReconFFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty Hunters
2026-04-22 2026NoSQL Injection: Advanced Exploitation GuideSQLiNoSQL Injection: Advanced Exploitation Guide
2026-04-22 2026Hacking Next.js Targets: Advanced SSRF Exploitation GuideSSRFHacking Next.js Targets: Advanced SSRF Exploitation Guide
2026-04-22 2026Catflix CTF: Exploiting SSRFs in Next.js MiddlewareSSRFCatflix CTF: Exploiting SSRFs in Next.js Middleware
2026-04-17 2026Broken authentication: 7 Advanced ways of bypassing 2-FA (Intigriti)AuthNBroken authentication: 7 Advanced ways of bypassing 2-FA (Intigriti)
2026-04-17 2026GitHub dorking for beginners: find more vulnerabilities (Intigriti)ReconGitHub dorking for beginners: find more vulnerabilities (Intigriti)
2026-04-16 2026CSRF: Advanced Exploitation Guide - IntigritiCSRFCSRF: Advanced Exploitation Guide - Intigriti
2026-04-16 2026Crafting Your Bug Bounty Methodology: A Complete GuideBug BountyCrafting Your Bug Bounty Methodology: A Complete Guide
2026-04-11 2026SSTI: Advanced Exploitation Guide | IntigritiRCESSTISSTI: Advanced Exploitation Guide | Intigriti
2026-04-11 2026Hacker Tools: JWT_ToolJWTHacker Tools: JWT_Tool
2026-04-11 2026November CTF Challenge: Exploiting JWT vulnerabilities to achieve RCEJWTNovember CTF Challenge: Exploiting JWT vulnerabilities to achieve RCE
2026-04-11 2026Intigriti: Exploiting JWT vulnerabilities — advanced exploitation guideAPI SecBug BountyJWTIntigriti: Exploiting JWT vulnerabilities — advanced exploitation guide
2026-04-10 2026Exploiting PDF Generators: Complete Guide to SSRFSSRFExploiting PDF Generators: Complete Guide to SSRF
2026-04-10 2026Recon for Bug Bounty: 8 Essential Tools | IntigritiBug BountyReconRecon for Bug Bounty: 8 Essential Tools | Intigriti
2026-04-10 202631 Bite-Sized Tips and Bug Bounty Resources for 2026Bug Bounty31 Bite-Sized Tips and Bug Bounty Resources for 2026
2026-04-10 2026XXE Injection: Advanced Exploitation GuideXXEXXE Injection: Advanced Exploitation Guide
2026-04-10 2026CSP Bypasses: Advanced Exploitation GuideXSSCSP Bypasses: Advanced Exploitation Guide
2026-04-10 2026Hunting for Blind XSS Vulnerabilities: A Complete GuideXSSHunting for Blind XSS Vulnerabilities: A Complete Guide
2026-04-10 2026Reflected XSS: Advanced Exploitation GuideXSSReflected XSS: Advanced Exploitation Guide
2026-04-09 2026SSRF: Advanced Exploitation GuideSSRFSSRF: Advanced Exploitation Guide
2026-04-06 2026BugQuest 2026: 31 Days of Broken Access Control | IntigritiAuthZIDORBugQuest 2026: 31 Days of Broken Access Control | Intigriti
2026-04-03 2026Insecure Direct Object References (IDOR) | Intigriti HackademyIDORInsecure Direct Object References (IDOR) | Intigriti Hackademy
2026-04-03 2026IDOR: A Complete Guide to Exploiting Advanced IDOR Vulnerabilities | IntigritiIDORIDOR: A Complete Guide to Exploiting Advanced IDOR Vulnerabilities | Intigriti
2026-04-03 2026Broken Authentication: Advanced Exploitation Guide | IntigritiAuthZBroken Authentication: Advanced Exploitation Guide | Intigriti
2024-10-17 2024Server-Side Request Forgery (SSRF)SSRFThe content highlights a global security provider trusted by major organizations, utilizing ethical hackers for agile security testing. The emphasis is on a community of ethical hackers who approach security challenges from an attacker's perspective. The provider offers crowdsourced security services to enhance security measures for organizations.