|
|
| 1. | | Just Another Recon Guide for Pentesters and Bug Bounty Hunters (offensity.com) | | 2 points by slashcrypto on June 19, 2020 | past | |
| 2. | | Sophisticated Phishing Using Homograph Attacks (offensity.com) | | 4 points by slashcrypto on May 22, 2019 | past | 3 comments | |
| 3. | | Pwning eBay – How I Dumped eBay Japan's Website Source Code (slashcrypto.org) | | 4 points by slashcrypto on Nov 28, 2018 | past | |
| 4. | | #BugBounty – Hacking TenX Accounts for Fun and Bitcoins (slashcrypto.org) | | 2 points by slashcrypto on March 15, 2018 | past | |
| 5. | | Steal Funds from TenX Users – Just Another Bug Bounty Story (slashcrypto.org) | | 3 points by slashcrypto on Feb 27, 2018 | past | |
| 6. | | Google Bug Bounty – The 5k Error Page (slashcrypto.org) | | 2 points by slashcrypto on May 18, 2017 | past | |
| 7. | | Ask HN: GSM encryption suppression | | 1 point by slashcrypto on April 18, 2017 | past | |
| 8. | | [flagged] Why the “WhatsApp-backdoor” is not a WhatsApp-backdoor (slashcrypto.org) | | 58 points by slashcrypto on Jan 13, 2017 | past | 26 comments | |
| 9. | | Netflix Account Takeover Through Automated Phone Calls (slashcrypto.org) | | 2 points by slashcrypto on Nov 7, 2016 | past | |
| 10. | | Ebay posts every character a user types into the password box (slashcrypto.org) | | 497 points by slashcrypto on June 29, 2016 | past | 201 comments | |
|

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
|