Search What is Detectify?

Bypassing Cloudflare WAF with the origin server IP address

cloudflare Detectify Crowdsource Gwendal Le Coguic WAF
Detectify Crowdsource Paul Dannewitz Plugins WordPress

Improving WordPress plugin security from both attack and defense sides

blind vulnerabilities injection out-of-band SQL

What is a blind vulnerability and how can it be exploited and detected? 

Anne-Marie Eklund Löwinder CISO IIS interview keys to the internet women in security

Anne-Marie Eklund Löwinder: “I was good at making others’ code stop running very early on.”

CSP response headers

Content Security Policy (CSP) explained including common bypasses

Detectify Crowdsource IDOR Lerhan URL shorteners

Lerhan: Bypassing IDOR protection with URL shorteners

http headers HTTP response splitting XSS

HTTP response splitting exploitations and mitigations

automated security CI/CD DAST DevSecOps

Fitting automated security throughout the CI/CD pipeline

open redirect SSRF web vulnerability

The real impact of an Open Redirect vulnerability

crowdsource Meet the hacker securinti

Meet the Hacker: Inti De Ceukelaire – “While everyone is looking for XSS I am just reading the docs.”