Lap 1: JWT authentication bypass via unverified signaturePortSwigger JWT attacks lap one writeup بالعربيSep 8, 2024Sep 8, 2024
How I found my first Business logic vulnerability — The complete storyBusiness Logic Vulnerability in Bug Bounty Hunting Write-upMay 16, 20242May 16, 20242