2Advanced web application fingerprinting with favicon hashes (opens in new tab)(blog.razzsecurity.com)1mukesh6101y ago0
3Exploiting CI / CD Pipelines for fun and profit (opens in new tab)(blog.razzsecurity.com)124mukesh6101y ago44