exploit development 5
- Exploiting trust - Weaponizing permissive CORS configurations
- Empowering Junior Testers - Strategies for Uncovering Critical Vulnerabilities in Web Applications
- Cross-site scripting attacks in action and how to protect against them
- Making Web Cache Deception critical in 30 minutes
- Using HTTP request smuggling to hijack users' sessions