Jyoti Agarwalroottusk/vapi WriteupThis blog post provides a tutorial of exploiting the top 10 API vulnerabilities on vAPI, which stands for Vulnerable Adversely Programmed…Feb 15, 20222Feb 15, 20222
Jyoti Agarwalvulnerable API (vAPI) writeupApplication Programming Interfaces (APIs) are rapidly turning into a mark of worry among cybersecurity experts. As associations keep on…Feb 8, 2022Feb 8, 2022
Jyoti AgarwalPwnkit: CVE-2021–4034 WalkthroughTASK 1 Info Introduction and DeployJan 31, 2022Jan 31, 2022
Jyoti AgarwalJerry WalkthroughIt is 2nd machine in the beginner track and it is I guess the easiest machine on hackthebox. This machine is developed by mrh4sh.Jan 7, 2022Jan 7, 2022
Jyoti AgarwalLame WalkthroughI had started a series to write a walkthrough of the beginner track of HackTheBox. So, we start with the machine called LAME as our first…Jan 5, 2022Jan 5, 2022
Jyoti AgarwalMeow WalkthroughIt is a starting machine in HackTheBox Firstly download the starting point VPN before starting the machine. Then click on spawn machine and…Jan 3, 2022Jan 3, 2022