
My hacking adventures with Safari reader mode
My hacking adventures with Safari reader mode Summary In March 2020, I wrote a blogpost on Executing Scripts In Safari Reader Mode To CSP Bypass,
AUTHOR
Best Articles
My hacking adventures with Safari reader mode Summary In March 2020, I wrote a blogpost on Executing Scripts In Safari Reader Mode To CSP Bypass,
Reading mode is a feature implemented in most browsers that allow users to read articles in a clutter-free view i.e rendering a page in a
Sometime back, I decided to look at bookmarks API available for browser extensions. This API sounds interesting to me because it allows you to play
A few days back I was looking for a tool to maintain my notes and important code snippets and I came across a tool called
In browsers, an address bar represents the current web address. Safari address bar spoof vulnerability It is an ability to keep legit URL in the
One of the most common ways to navigate to a website or URLs is by typing website address in the browser address bar But this
Browser Extensions A browser extension is a plug-in that extends the functionality of a web browser. Extensions are capable of managing cookies, bookmarks, storage, and
Research Powered Cybersecurity Services and Training. Eliminate security threats through our innovative and extensive security assessments.
Fill in your details and get your copy of the datasheet in few seconds
Fill in your details and get your copy of the ebook in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Let’s make cyberspace secure together!
Requirements
What our clients are saying!
Trusted by