PinnedNol White HatinSystem WeaknessEvade Windows Defender reverse shell detection with PowercatSummaryMay 19, 2022May 19, 2022
Nol White HatinSystem WeaknessSemi-automate SQL injection without SQLMap (JavaVulnerableLab)SummaryOct 31, 2023Oct 31, 2023
Nol White HatinInfoSec Write-upsWrite-up: Oracle SQL injection (PortSwigger Academy).SummaryOct 1, 2023Oct 1, 2023
Nol White HatinInfoSec Write-upsXSS exploitation without using the <script> tagSummarySep 21, 2023Sep 21, 2023
Nol White HatinInfoSec Write-upsReverse shell to your Amazon AWS EC2 instance as ‘root’ or ‘Administrator’ by injecting user-dataSummaryJul 12, 2023Jul 12, 2023
Nol White HatinSystem WeaknessPoC backdoored Docker image reveals the danger of using unverified images.SummaryJul 12, 20231Jul 12, 20231
Nol White HatinInfoSec Write-ups(Reverse) shell to your Azure VM as ‘Local System’ user or ‘root’ userSummaryApr 25, 2023Apr 25, 2023