Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Web Application Security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
170949
posts in
14.1
ms
Comprehensive
Login
Page Security Testing: A Practical Guide for
Pentesters
ย
๐ก๏ธ
Cybersecurity
medium.com
ยท
2d
Protecting
Cookies
with Device Bound Session
Credentials
ย
๐
Security
malware.news
ยท
5d
How I
bypassed
client-side validation and achieved
RCE
through SQL injection
ย
๐
SQL Injection
medium.com
ยท
3h
Server-side
Template
Injection in a
Sandboxed
Environment
ย
๐
Security
medium.com
ยท
17h
Application
Security Best
Practices
ย
๐
OWASP Top 10
medium.com
ยท
2d
Hackers
access
Booking.com
user data, company secures systems
ย
๐
Security
securityaffairs.com
ยท
23h
Security
Scanning
ย
๐
Security
lemmy.world
ยท
1h
โ๏ธ 03. โ User Role
Controlled
by Request
Parameter
ย
๐
Security
medium.com
ยท
3d
I'm building a website
integrity
and security monitor. The
backend
is written in...
ย
โ ๏ธ
XSS
news.ycombinator.com
ยท
1d
ยท
Hacker News
ClawGuard
: A Runtime Security Framework for Tool-Augmented LLM Agents Against
Indirect
Prompt Injection
ย
๐ก๏ธ
AI Security
arxiv.org
ยท
14h
TryHackMe
Walkthrough
ย
๐
Security
infosecwriteups.com
ยท
4h
Malicious
anti-adblocking
ย
โ ๏ธ
XSS
ulik.bearblog.dev
ยท
8h
Malicious
Job
Assessments
ย
๐
Security
thecout.com
ยท
2d
ยท
Hacker News
Chrome
combats
session
theft
.
ย
๐
Security
theverge.com
ยท
5d
Securing non-human identities: automated
revocation
, OAuth, and
scoped
permissions
ย
๐
Digital Privacy
blog.cloudflare.com
ยท
5h
You Donโt Have API Security. You Have a
WAF
.
ย
๐
Security
medium.com
ยท
1h
Mastering Web Security: A Deep Dive into
OWASP
Juice
Shop
ย
๐
OWASP Top 10
medium.com
ยท
1d
Pinned
(
HTB
)
ย
๐
Security
strayvoltage.bearblog.dev
ยท
4h
No one can force me to have a
secure
website!!!
ย
๐
Security
youtube.com
ยท
19h
ยท
Hacker News
,
r/programming
WebStrike
: Investigating a Web Server Compromise โ Analysis & MITRE ATT&CK MAPPING (
CyberDefenders
โฆ
ย
๐
Security
medium.com
ยท
2d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help