Geni_WazirUnderstanding Request Smuggling: A Deep Dive into HTTP ExploitsGet an overview of this attack with real examples and dive deep into understanding every aspect.Sep 27Sep 27
Geni_WazirChowkidar: Your Digital PehredarHello everyone, I am excited to introduce Chowkidar, a platform designed specifically for security enthusiasts and researchers in the field…May 20May 20
Geni_WazirThe Art of Access: Privilege Escalation through Multiple MethodsMost of you are familiar with privilege escalation attacks. For those who are not, it’s an attack where a user with limited privileges…Feb 23Feb 23
Geni_WazirWhat Vulnerabilities We Get from a File UploadLately, I’ve transitioned my preferred vulnerability testing focus from user input to examining the upload functionality. This shift…Jan 13Jan 13
Geni_WazirLab setup for Vulnerability Assessment and Penetration TestingOver the years, I have dedicated myself to testing and exploring more efficient tools and scripts to simplify the process of initiating…Jan 72Jan 72
Geni_WazirHow I got my first RCEAs a penetration tester, the task of uncovering all vulnerabilities can be quite challenging. Clients expect to identify numerous critical…Jan 5Jan 5