PinnedÁngel CortezinSystem WeaknessDjango Web-Framework vs Burp Suite ProxyThis is Part 1 of an on going series where we are going to build a web app using Python’s Django framework while simultaneously testing its…May 15, 2022May 15, 2022
PinnedÁngel CortezinPython in Plain EnglishHow to Investigating DLL Logs with PythonA guide on investigating DLL logs with Python.Feb 19, 20221Feb 19, 20221
PinnedÁngel CortezinPython in Plain EnglishNetwork Traffic Analysis with PythonHow you can use Python to analyze network traffic activity.Feb 3, 2022Feb 3, 2022
PinnedÁngel CortezUnderstanding Web Fuzzing for Ethical HackingWebsites have unique addresses just like your home address known as a Uniform Resource Locator (URL). If multiple entities shared one…Jan 8, 2022Jan 8, 2022
Ángel CortezinSystem WeaknessFile Upload VulnerabilitiesFrom Storing Malware to potentially hitting a Denial of Service Attack, this vulnerability affects both users and application servers Jan 22Jan 22
Ángel Cortezpdf payload%PDF-1.3 %öäüß 1 0 obj << /Type /Catalog /Pages 2 0 R /OpenAction 3 0 R >> endobj 4 0 obj << /Producer (Haru Free PDF Library 2.0.8) >>…Mar 2, 2023Mar 2, 2023
Ángel CortezHow I got a job as an Ethical Hacker without Certs or a College degreeJul 30, 20227Jul 30, 20227