Pemburu Bug & Pengujian Penetrasi

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Synchronizer Token Pattern

Securing Your Digital Life

A Comprehensive Guide to Desktop as a Service (DaaS) Security

Unicrypt project

Vulnerabilities in Standalone 5G Networks Expose Users to Information

Wazuh and Its XDR Approach

PKI — public key infrastructure, explained

The Ear Inside Your Phone

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Aidil Arief

Aidil Arief

Pemburu Bug & Pengujian Penetrasi

More from Medium

XXE Attack — QnA

How did I find Log4j vulnerability via Static Code Analysis and receive €€€ bounty?

[ CVE-2021-46146 ] Stored XSS via WikibaseMediaInfo caption fields at commons.wikimedia.org

[WRITE-UP] Missing rate-limiting. How I was able to add any unowned phone number to my FB account?