You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A curated list of powerful techniques to manipulate JavaScript code at runtime – great for debugging, prototyping, or reverse engineering frontend behavior directly in the browser (yes, even on mobile).
These methods allow you to inspect, intercept, or override behavior in real time, without changing the actual source code or deploying anything new.
A small browser-side debug script to intercept and modify Solr responses on /search_endpoint/ – useful for UI testing or facet debugging without touching the backend.
💡 Concept
Intercepts XMLHttpRequest
Captures the response once it's ready (readyState === 4)
Replaces the response with a modified JSON object
Logs both the original and the modified versions for comparison
Git is hard: screwing up is easy, and figuring out how to fix your mistakes is fucking impossible. Git documentation has this chicken and egg problem where you can't search for how to get yourself out of a mess, unless you already know the name of the thing you need to know about in order to fix your problem.
So here are some bad situations I've gotten myself into, and how I eventually got myself out of them in plain english*.
Hacking and “being a hacker” have fascinated me for over seven years now, and since then, I have started a career in Red Teaming. This job is particularly interesting, because you have to know many things about (offensive) cybersecurity. Basically, you get to hack entire companies. You do this to test their defenses and uncover vulnerabilities.
During my work in this field, I’ve acquired many skills and learned quite a few hacks which I want to share in this blog post.
As a fair warning: If you are already working in cybersecurity for a long time, you might not get a whole lot of new knowledge from this post, but you might want to check out some of my other blog posts. Additionally, this could be the blog post you share with your friends and family to get them interested in the amazing job you are doing.
I will also sort the skills from useful for almost everyone to interesting for techies. And since learning how to hack computers is a whole other topic, we wi
It is basically a search string that uses advanced search query to find information that are not easily available on the websites. It is also regarded as illegal google hacking activity which hackers often uses for purposes such as cyber terrorism and cyber theft.
Dork
They are like search criteria in which a search engine returns results related to your dork.
People often take Google as just a search engine used to find text, images, videos, and news. However, in the infosec world, it has a very vast role. Google can also be used as a very useful hacking tool.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters