0 day exploitThe Hidden Risks of Package Management Systems: Shedding Light on the Dependency Confusion…Are you confident that your software packages are free from any hidden risks? Think again. In the world of package management systems…6 min read·Jul 13, 2023----
0 day exploitUnveiling the Power of Binary Exploitation: Mastering Stack-Based Overflow TechniquesDear Fellow hackers & info-sec hobbyists,11 min read·Jul 7, 2023----
0 day exploitInsecure Data Storage on different crypto exchangesSummary :2 min read·Jul 6, 2023--1--1
0 day exploitTalking about how I hacked NFT marketplace and how I earned $5,500 with multiple bugs| Full…4 min read·Jul 5, 2023----
0 day exploitKubelet debugging endpoint leading full server takeoverEveryone knows what is “kubelet” , The kubelet is a critical component of the Kubernetes cluster responsible for managing individual nodes…2 min read·Jun 27, 2023----
0 day exploitWhat is Respberry pi ? how attackers use it for hacking# What is Raspberry Pi5 min read·Jun 2, 2023----