IndominusByteJinja2 SSTI filter bypassesas you (should) know — blacklists are bad and can often be circumvented. To check the class in SSTI jinja2 we can use payload…Jan 26, 2020Jan 26, 2020
IndominusBytePHP query string parser vulnerabilityAs you know, PHP converts query string (in the URL or body) to an associative array inside $_GET or $_POST. For example: ?foo=bar becomes…Jan 26, 2020Jan 26, 2020
IndominusByteUnrestricted File Upload In PHPWhy File Upload Forms are a Major Security Threat?Dec 27, 2019Dec 27, 2019
IndominusByteSSTI in Flask/Jinja2What is SSTI ( Server-Side Template Injection)Dec 27, 20196Dec 27, 20196
IndominusByteWhy you should use ThreadPoolExecutor() instead ProcessPoolExecutor() based on CTF challengeBefore entering into the discussion, let us know more about what is multiprocessing and multithreadingNov 23, 20191Nov 23, 20191