Sep 9, 2025Exploiting Email Normalization and Custom Database Configurations in Auth0 for Account TakeoverHussam Ahmed
Jul 28, 2025Exploiting Auth0 Misconfigurations: A Case Study on Account Linking VulnerabilitiesHussam Ahmed