0 day exploitThe Hidden Risks of Package Management Systems: Shedding Light on the Dependency Confusion…Are you confident that your software packages are free from any hidden risks? Think again. In the world of package management systems…Jul 13, 2023Jul 13, 2023
0 day exploitUnveiling the Power of Binary Exploitation: Mastering Stack-Based Overflow TechniquesDear Fellow hackers & info-sec hobbyists,Jul 7, 2023Jul 7, 2023
0 day exploitTalking about how I hacked NFT marketplace and how I earned $5,500 with multiple bugs| Full…Jul 5, 2023Jul 5, 2023
0 day exploitKubelet debugging endpoint leading full server takeoverEveryone knows what is “kubelet” , The kubelet is a critical component of the Kubernetes cluster responsible for managing individual nodes…Jun 27, 2023Jun 27, 2023
0 day exploitWhat is Respberry pi ? how attackers use it for hacking# What is Raspberry PiJun 2, 2023Jun 2, 2023