Published inInfoSec Write-upsConfidential Message Exchange Between ServicesGranting confidentiality, integrity, and authentication to your RESTful API with encryption and signaturesFeb 15Feb 15
9 Maneras de Ganar Criptomonedas y NFTs Gratis en BinanceConsigue criptomonedas y NFTs de forma gratuita con estas actividades y promocionesDec 18, 2022Dec 18, 2022
Published inInfoSec Write-upsHackeando WordleCómo adivinar la palabra del día a través de ingeniería inversaFeb 15, 20221Feb 15, 20221
Estadísticas de visionado de NetflixDescubre cómo has invertido tu tiempo en Netflix con esta extensión gratuitaJul 8, 2021Jul 8, 2021
Published inInfoSec Write-upsHackeando Voy, Hackeando Vengo — El Caso BiciMAD GoUna vulnerabilidad en el servicio público de alquiler de bicicletas de MadridJul 2, 2021Jul 2, 2021
Published inInfoSec Write-upsEthical Hacking Stories — Denial-of-Service to BiciMAD BikesMay 27, 20211May 27, 20211
Published inBetter Programming9 Security Implications to Consider Before Deploying a Web AppA checklist to protect web applications against the most common attacksFeb 12, 2021Feb 12, 2021
Published inInfoSec Write-upsRemote Code Execution Through Cross-Site Scripting In ElectronCVE-2020–35717 — RCE through XSS in zonote Electron AppJan 5, 202110Jan 5, 202110
Published inInfoSec Write-upsFinding Data Leaks In Online FormattersUsing Postman and Newman to find useful data saved in online formatting toolsDec 27, 2020Dec 27, 2020
Gamifying your viewing activity on NetflixAchievements with Netflix Viewing StatsApr 20, 2020Apr 20, 2020