PinnedPublished inSystem WeaknessEvade Windows Defender reverse shell detection with PowercatSummaryMay 19, 2022May 19, 2022
Published inInfoSec Write-upsPractical study material OSWP Part 1: WPA2-PSK WalkthroughSummaryJun 9Jun 9
Published inInfoSec Write-upsPractical study material OSWP Part 2: WPA2-MGT WalkthroughSummaryJun 9Jun 9
Published inT3CHCommand injection to web shell in DVWA (high security level) on WindowsSummarySep 13, 2024Sep 13, 2024
Published inT3CHCommand injection to web shell in DVWA (high security level) on LinuxSummarySep 13, 2024Sep 13, 2024
Published inInfoSec Write-upsLinux reverse shell that (almost) always works.SummarySep 10, 2024A response icon2Sep 10, 2024A response icon2
Published inInfoSec Write-upsWindows reverse shell that (almost) always works.SummarySep 10, 2024A response icon3Sep 10, 2024A response icon3
Published inInfoSec Write-upsAutomate XSS testing with real browser renderingSummaryApr 23, 2024A response icon1Apr 23, 2024A response icon1
Published inSystem WeaknessThe Ultimate Pen Tester Guide to Command-InjectionSummaryJan 20, 2024Jan 20, 2024