PinnedAlly Petitt5 Ways I Bypassed Your Web Application Firewall (WAF)IntroductionJun 1, 20233Jun 1, 20233
PinnedAlly PetittHow I Found Authentication Bypass Vulnerability — CVE-2023–43154IntroductionSep 29, 20231Sep 29, 20231
Ally PetittHow to Use NVRAM When Emulating an Embedded DeviceAuthor’s note: This was an original blogpost uploaded to my personal website ally-petitt.com.Jul 5Jul 5
Ally PetittStealthy Exploit Opens Door for Pre-Compilation Code ExecutionIntroductionDec 2, 2023Dec 2, 2023
Ally PetittHow to safely convert to LVM without losing your dataIntroductionAug 19, 20231Aug 19, 20231
Ally PetittBeyond the Screen: The Hidden World of Firmware SecurityIntroductionAug 5, 2023Aug 5, 2023
Ally PetittReverse Engineering — Analyzing HeadersIn this article, the tool will be used to dump…Jul 13, 2023Jul 13, 2023
Ally Petitt5 Ways I Found Your Deleted FilesComputer Forensics for File RecoveryMay 13, 20232May 13, 20232