Open in app

Sign in

Write

Sign in

Mawee
Mawee

9 Followers

Home

About

Sep 25

Unmasking Windows Library Files: A Deep Dive into Client-Side Exploitation

Hello Reader! This time we are getting our hands dirty with some client-side Windows exploitation. We will leverage Windows Library Files to obtain remote code execution. Lets start with a small introduction to Windows Library Files and how we will use these to execute commands on a remote machine. Windows…

Windows

5 min read

Unmasking Windows Library Files: A Deep Dive into Client-Side Exploitation
Unmasking Windows Library Files: A Deep Dive into Client-Side Exploitation
Windows

5 min read


Sep 13

Unlocking Secrets: Exploiting SQL Injection in the WP “Perfect Survey” Plugin

Hey there, folks! I’m back with another exciting post that’s all about diving into the world of cybersecurity. In this adventure, we’re on a mission to do something pretty cool: we want to take control of a computer by exploiting a sneaky problem called an SQL Injection. …

Exploitation

4 min read

Unlocking Secrets: Exploiting SQL Injection in the WP “Perfect Survey” Plugin
Unlocking Secrets: Exploiting SQL Injection in the WP “Perfect Survey” Plugin
Exploitation

4 min read


Aug 29

XSS: A Gateway to Command and Control

This post delves into the art of exploiting a Cross-Site Scripting (XSS) vulnerability within a WordPress plugin known as “visitors.” The ultimate goal? To create an admin-level account and utilize it to gain system access. The “visitors” plugin serves as a data logger for website visitors, capturing details like IP…

Vulnerability

4 min read

XSS: A Gateway to Command and Control
XSS: A Gateway to Command and Control
Vulnerability

4 min read

Mawee

Mawee

9 Followers

Security Analyst

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams