1. Exploiting Race Conditions 2. Bypassing CSP via ajax.googleapis.com 3. Token Hijacking via PDF File
Carefully selected write-ups and reports.
© 2024 — Silesia Security Lab