PinnedAlimuhammadsecuredinThe Deep HubMaking counterfeit US bills Part 2This article underlines how counterfeit money is manufactured, emphasizing its impact on economies worldwide, including detailed examples…Jul 15Jul 15
PinnedAlimuhammadsecuredinThe Deep HubHow it’s Made: Counterfeit MoneyRead part 2 here: Click Me!Jul 111Jul 111
PinnedAlimuhammadsecuredinThe Deep HubHow students are compromising their school’s internal networks.This is information I’ve learned throughout the years of my time in public education going far as back as elementary school!Jun 173Jun 173
PinnedAlimuhammadsecuredinThe Deep HubHow 12-year-olds hack thousands of accounts a dayDuring the COVID-19 era many teens were locked inside of their homes and addicted to video games started downloading cheats and buying…Jun 143Jun 143
PinnedAlimuhammadsecuredinThe Deep HubHow I hacked a marriage database: tale of IDORA Tale of IDOR, PII Disclosure, and Recon TipsJun 143Jun 143
AlimuhammadsecuredinThe Deep HubHow I got RCE on an Indian university without admin credentials Tale of directory listing, SQL…Hacking Indian university’s web servers.3d ago3d ago
AlimuhammadsecuredinThe Deep HubHow I found XSS and open redirect in Kamiapp.com accidentallyWhy it’s important to always read JS files and look at the consoleAug 26Aug 26
AlimuhammadsecuredSolving Web Assembly CTF the “wrong” way.How I solved a CTF challenge that uses a Web Assembly module (Binary that’s loaded with JS) to read the flag directly from memory instead…Aug 14Aug 14
AlimuhammadsecuredinThe Deep HubHacking websites with PHP Deserialization + LFI + PHPUsing PHP(S) files -> source files instead of PHP to bypass WAF to access source code. From there a deserialization vulnerability can be…Aug 14Aug 14
AlimuhammadsecuredOverwriting Variables Using C’s printf Vulnerability to Hijack ConditionsThis abuses C’s printf functions in programs to over-write variables to values of our choosing. This type of exploitation is known as…Aug 9Aug 9