Published inInfoSec Write-upsConfidential Message Exchange Between ServicesGranting confidentiality, integrity, and authentication to your RESTful API with encryption and signaturesFeb 15Feb 15
9 Maneras de Ganar Criptomonedas y NFTs Gratis en BinanceConsigue criptomonedas y NFTs de forma gratuita con estas actividades y promocionesDec 18, 2022Dec 18, 2022
Published inInfoSec Write-upsHackeando WordleCómo adivinar la palabra del día a través de ingeniería inversaFeb 15, 20221Feb 15, 20221
Estadísticas de visionado de NetflixDescubre cómo has invertido tu tiempo en Netflix con esta extensión gratuitaJul 8, 2021Jul 8, 2021
Published inInfoSec Write-upsHackeando Voy, Hackeando Vengo — El Caso BiciMAD GoUna vulnerabilidad en el servicio público de alquiler de bicicletas de MadridJul 2, 20212.7KJul 2, 20212.7K
Published inInfoSec Write-upsEthical Hacking Stories — Denial-of-Service to BiciMAD BikesMay 27, 20211.99K1May 27, 20211.99K1
Published inBetter Programming9 Security Implications to Consider Before Deploying a Web AppA checklist to protect web applications against the most common attacksFeb 12, 20215.2KFeb 12, 20215.2K
Published inInfoSec Write-upsRemote Code Execution Through Cross-Site Scripting In ElectronCVE-2020–35717 — RCE through XSS in zonote Electron AppJan 5, 20211.4K10Jan 5, 20211.4K10
Published inInfoSec Write-upsFinding Data Leaks In Online FormattersUsing Postman and Newman to find useful data saved in online formatting toolsDec 27, 20205.5KDec 27, 20205.5K
Gamifying your viewing activity on NetflixAchievements with Netflix Viewing StatsApr 20, 20205.3KApr 20, 20205.3K