Ayoub
Author
Ayoub
Senior security content developer
Intigriti Bug Bytes #233 - February 2026 🚀
Bug Bytes
February 20, 2026
Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring: How a read-only Kubernetes permission turned into full cluster takeover AI agent autonomously finds a 1-click RCE Race condition in blockchain infrastructure worth billions Finding over 500 high-severity vul
How to use AI for improved vulnerability report writing
Hacking Tools
February 17, 2026
Report writing is an integral part of bug bounty or any type of vulnerability assessment. In fact, sometimes, it can become the most important phase. Submitting a confusing report can often lead to misalignment and faulty interpretation of your reported vulnerability. On the contrary, a well-written
Exploiting PostMessage vulnerabilities: A complete guide
Hacking Tools
January 31, 2026
PostMessage vulnerabilities arise when developers fail to properly validate message origins or sanitize content within cross-origin communication handlers. As modern web applications increasingly rely on the postMessage API for cross-origin communication, whether for embedded widgets, OAuth flows, t
Intigriti 0126 CTF Challenge: Exploiting insecure postMessage handlers
Hacking Tools
January 28, 2026
At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security researcher community. January's challenge presented participants with CRYPTIGRITI, a cryptocurrency trading platform where users could buy and trade Bitcoin (BTC), Monero (XMR), and a custo
Intigriti Bug Bytes #232 - January 2026 🚀
Bug Bytes
January 16, 2026
Welcome to the latest edition of Bug Bytes (and the first of 2026)! In this month’s issue, we’ll be featuring: Hijacking official AWS GitHub repositories New anonymous bug bounty forum Finding more IDORs & SSRFs using a unique methodology New JavaScript file scanner to find hidden endpointsÂ
Exploiting information disclosure vulnerabilities
Hacking Tools
January 12, 2026
Information disclosure vulnerabilities can arise in various peculiar ways, especially as applications continue to evolve and become more complex over time. Unlike some injection attacks, where several factors determine exploitability. Information disclosures can often lead to direct, standalone atta
December CTF Challenge: Chaining XS leaks and postMessage XSS
Hacking Tools
December 24, 2025
At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security researcher community. December's challenge by Renwa took inspiration from the Marvel Cinematic Universe, specifically Thanos's quest to collect all six Infinity Stones. This challenge requi
Intigriti Bug Bytes #231 - December 2025 🚀
Bug Bytes
December 18, 2025
Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring: React2Shell scanner (with WAF bypasses) Identifying server origin IP to bypass popular WAFs CSRF exploitation cheat sheet Finding vulnerabilities in sign-ups   And so much more! Let’s dive in! November’s In
Exploiting business logic error vulnerabilities
Hacking Tools
December 9, 2025
It's no secret that complexity is the biggest rival of safe applications. As web apps become more sophisticated, they create countless opportunities for logic flaws to arise. Unlike technical vulnerabilities that can be easily automated, business logic errors emerge from the gap between how develope
Bypassing Content Security Policy (CSP)
Hacking Tools
November 30, 2025
Content Security Policies (CSPs) are often deployed as the last line of defense against client-side attacks such as cross-site scripting (XSS) and clickjacking. Since their first introduction in 2012, they've enabled developers to control which and what resources are allowed to load and evaluate wit
November CTF Challenge: Exploiting JWT vulnerabilities to achieve RCE
Hacking Tools
November 26, 2025
At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security research community. This month, we've decided to take on a challenge ourselves as a way to give back to the community. In response to one of our recent articles, we decided to focus on JSON
Intigriti Bug Bytes #230 - November 2025 🚀
Bug Bytes
November 21, 2025
Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring: Finding an RCE using AI in GitHub CORS exploitation cheat sheet Scanning codebases with AI Bypassing paywalls SSTIs in AI models   And so much more! Let’s dive in! We are thrilled to announce that Inti
Hunting for DOM-based XSS vulnerabilities: A complete guide
Hacking Tools
November 11, 2025
Traditional cross-site scripting (XSS) vulnerabilities were prevalent when server-side rendering (with languages like PHP, JSP, and ASP) was the norm. However, as applications become more complex and developers continue to shift application logic to the client-side, more complex client-side vulnerab
Exploiting JWT vulnerabilities: A complete guide
Hacking Tools
November 7, 2025
Before JSON Web Tokens (JWTs) became popular in today's app development landscape, web applications predominantly used server-side sessions, which presented horizontal scalability issues. JWTs solved this by moving authentication data from the server to the token itself. They are self-contained, sta
