Pinned5 Ways I Bypassed Your Web Application Firewall (WAF)IntroductionJun 1, 2023A response icon3Jun 1, 2023A response icon3
PinnedHow I Found Authentication Bypass Vulnerability — CVE-2023–43154IntroductionSep 29, 2023A response icon1Sep 29, 2023A response icon1
How to Use NVRAM When Emulating an Embedded DeviceAuthor’s note: This was an original blogpost uploaded to my personal website ally-petitt.com.Jul 5, 2024Jul 5, 2024
How I Found 3 CVEs in 2 DaysAuthor: Ally PetittMar 21, 2024A response icon2Mar 21, 2024A response icon2
How to Find more Vulnerabilities — Source Code Auditing ExplainedIntroductionJan 1, 2024A response icon1Jan 1, 2024A response icon1
How to safely convert to LVM without losing your dataIntroductionAug 19, 2023A response icon1Aug 19, 2023A response icon1
Reverse Engineering — Analyzing HeadersIn this article, the tool will be used to dump…Jul 13, 2023Jul 13, 2023