Roole: Exploiting an IDOR Vulnerability to Take Over a Contract The day I managed to take control of a contract on the Roole platform by exploiting an IDOR vulnerability Read This Article
[Casino Max Break]: Technical Overview of an IDOR Exploit for Free Purchases A detailed analysis of a vulnerability that once allowed manipulation of loyalty rewards at Casino to obtain free purchases. A fascinating dive into the exploitation of an IDOR vulnerability. Read This Article
Allianz Mobile App: Exploiting an IDOR Vulnerability to Access Sensitive Documents How a security flaw in the Allianz mobile app allowed access to confidential documents belonging to all customers Read This Article
eBPF: Orchestrating the Kernel’s Secret Symphony eBPF: Master the Linux kernel for security—uncover its secrets and transform system monitoring with power and discretion. Read This Article