PinnedVery Lazy TechAdvanced Exploitation Techniques for Bug Bounty: Beyond the BasicsIntroduction to Advanced ExploitationJun 9Jun 9
PinnedVery Lazy TechFrom Novice to Ninja: How the OSCP Cheatsheet Can Catapult Your Cyber Career!General Enumeration — NmapMay 16May 16
Very Lazy TechPenetration Testing WiFi Networks: A Comprehensive GuideIn the modern age, wireless networks (WiFi) have become ubiquitous, facilitating seamless internet connectivity across devices. However…19h ago19h ago
Very Lazy TechActive Directory Methodology in Pentesting: A Comprehensive GuideIn today’s digital landscape, Active Directory (AD) serves as the backbone for managing network resources in most enterprise environments…3d ago3d ago
Very Lazy TechUltimate Guide to Effective Web Application Penetration TestingWeb application penetration testing is a crucial skill for ensuring the security and integrity of web applications. Whether you’re a…4d ago14d ago1
Very Lazy TechBypass Authentication Techniques: A Comprehensive GuideIn today’s digital age, security vulnerabilities pose significant risks to systems and data integrity. Understanding and mitigating these…Jun 15Jun 15
Very Lazy TechEnhancing Your Understanding of Local File Inclusion (LFI)Local File Inclusion (LFI) is a prevalent web application vulnerability that occurs when an application includes files on a server without…Jun 13Jun 13
Very Lazy TechMastering SQL Injection: 15 Techniques and Code Examples for Web SecuritySQL injection (SQLi) remains one of the most prevalent and dangerous threats to web applications. It occurs when malicious SQL statements…Jun 11Jun 11
Very Lazy TechPOC — CVE-2024–4956 -Unauthenticated Path TraversalPOC — CVE-2024–4956 — Nexus Repository Manager 3 Unauthenticated Path TraversalJun 10Jun 10
Very Lazy TechAuthentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to…Jun 4Jun 4