Armand JasharajFrom Secure to Breached: The Journey from Confidence to Compromise“We’re Totally Secure… Except When We’re Not”Aug 6Aug 6
Armand JasharajPII-nacles of Discovery: Deep Recon, Fourth-Level Subdomains, and Abusing Exposed .git Repositories“All your Git repos are belong to us.”Aug 7, 20232Aug 7, 20232
Armand JasharajPENTEST TALES: Smuggling Blind XSS through an Admin Portal’s front door“The User-Agent is your best friend!”Mar 18, 2023Mar 18, 2023
Armand JasharajPENTEST TALES: Dumping a database in 15 minutes or less!Turning a $4.99 paywall into a $4,000 payoutFeb 23, 20231Feb 23, 20231
Armand JasharajPENTEST TALES: EXIF Data ManipulationDelivering XSS via unconventional meansNov 5, 20221Nov 5, 20221