Intigriti
27.2K subscribers
25:19
Decoding Spotify Barcodes - Defcon 32 Coin Challenge Solution [2024]
Intigriti
983 views • 1 month ago
30:31
XSS via CSPT and Open Redirect - Solution to August '24 Challenge (Defcon)
Intigriti
1.8K views • 1 month ago
2:57
Intigriti Kick off 2024
Intigriti
477 views • 1 month ago
12:58
Exploiting Insecure Output Handling in LLMs
Intigriti
857 views • 2 months ago
11:32
Indirect Prompt Injection
Intigriti
1.8K views • 2 months ago
5:41
Exploiting Vulnerabilities in LLM APIs
Intigriti
1.9K views • 3 months ago
9:28
Exploiting LLM APIs with Excessive Agency
Intigriti
1.3K views • 3 months ago
3:07
Intigriti Customer Story: Personio
Intigriti
469 views • 3 months ago
10:36
Performing CSRF Exploits Over GraphQL
Intigriti
1.4K views • 4 months ago
4:53
Misconfig Mapper - Hacker Tools
Intigriti
2.4K views • 5 months ago
7:12
Bypassing GraphQL Brute Force Protections
Intigriti
1K views • 5 months ago
7:51
Finding a Hidden GraphQL Endpoint
Intigriti
1.4K views • 5 months ago
5:05
Accidental Exposure of Private GraphQL Fields
Intigriti
970 views • 5 months ago
6:47
Accessing Private GraphQL Posts
Intigriti
3.2K views • 6 months ago
11:51
Prototype Poisoning and Unicode Case Mapping Collision - Solution to March '24 Challenge
Intigriti
1.3K views • 6 months ago
18:50
Introduction to GraphQL Attacks
Intigriti
1.9K views • 6 months ago
18:18
Aggressive Scanning in Bug Bounty (and how to avoid it)
Intigriti
2.1K views • 6 months ago
10:37
Exploiting Server-side Parameter Pollution in a REST URL
Intigriti
2.6K views • 6 months ago
24:30
Common Scoping Mistakes
Intigriti
839 views • 6 months ago
11:26
Exploiting Server-side Parameter Pollution in a Query String
Intigriti
5.9K views • 7 months ago
14:11
Understanding Scope, Ethics and Code of Conduct (CoC)
Intigriti
958 views • 7 months ago
7:20
Exploiting a Mass Assignment Vulnerability
Intigriti
4K views • 7 months ago
21:15
Unicode Normalization and Cookie Path Precedence - Solution to February (Valentines) '24 Challenge
Intigriti
1.2K views • 7 months ago
7:10
Finding and Exploiting an Unused API Endpoint
Intigriti
7.1K views • 7 months ago
7:34
Exploiting an API Endpoint using Documentation
Intigriti
8.7K views • 7 months ago
10:02
Web Shell Upload via Race Condition
Intigriti
3.5K views • 8 months ago
24:22
DOM Clobbering, CSPP (axios) and XSS - Unintended Solutions to January '24 Challenge
Intigriti
1.2K views • 8 months ago
8:41
Exploiting Time-sensitive Vulnerabilities
Intigriti
2.1K views • 8 months ago
2:29
Intigriti Customer Story: Microsoft
Intigriti
1.4K views • 8 months ago
15:37
Partial Construction Race Conditions
Intigriti
2K views • 8 months ago
Load More