1v0tOSINT: An Endless Journey of LearningIt has been many months since my last post, but the past two years have been filled with stories, friends, communities, CTFs, and events.Aug 27
Jan Carandell PiMY FIRST-EVER VULNERABILITYExposing an XSS DOM Vulnerability: Safeguarding Web IntegrityMay 191
João FernandesWeb Security: The Importance of Website Security and How to Protect Your Website from MalwareImagine waking up one morning and finding your website, your digital storefront, defaced and full of malicious code. Visitors are not…Aug 19Aug 19
NaotaCloneinInfoSec Write-upsICMP Exfiltration with Himitsu1. ICMP Protocol OverviewDec 14, 2023Dec 14, 2023
_Y000_inInfoSec Write-upsFun sql injection — mod_security bypassIn this writing I would like to show you a somewhat peculiar case with which I came across testing a website.Apr 16, 20211Apr 16, 20211
1v0tOSINT: An Endless Journey of LearningIt has been many months since my last post, but the past two years have been filled with stories, friends, communities, CTFs, and events.Aug 27
Jan Carandell PiMY FIRST-EVER VULNERABILITYExposing an XSS DOM Vulnerability: Safeguarding Web IntegrityMay 191
João FernandesWeb Security: The Importance of Website Security and How to Protect Your Website from MalwareImagine waking up one morning and finding your website, your digital storefront, defaced and full of malicious code. Visitors are not…Aug 19
_Y000_inInfoSec Write-upsFun sql injection — mod_security bypassIn this writing I would like to show you a somewhat peculiar case with which I came across testing a website.Apr 16, 20211
WillDomWhat is the Impact of AI and Machine Learning on Cyber Security?Do you want to protect your company’s data and systems from cyber threats? AI and Machine Learning technologies offer the solutions you’re…Jul 23