Kajal KatiyarJavaScript code injection campaignIn a recent observation of malware trends, a campaign can be seen in which legit websites are found to be injected with malicious code. Any…Aug 9
RED TEAMMalware Development : Part 4Today in Part 4, we will learn and practice code injection into a process in the context of malware development.Mar 271
Mohideen Abdul KhaderMalware development with ChatGPTDisclaimer: There’s no need for concern; this exercise is purely aimed at harnessing ChatGPT for educational purposes.Oct 14, 2023Oct 14, 2023
SpottedBaby Interdimensional InternetThis is a walkthrough for the HackTheBox machine called Baby Interdimensional Internet. It is rated as an easy box and I’ll agree that it…Jan 29Jan 29
Kajal KatiyarJavaScript code injection campaignIn a recent observation of malware trends, a campaign can be seen in which legit websites are found to be injected with malicious code. Any…Aug 9
RED TEAMMalware Development : Part 4Today in Part 4, we will learn and practice code injection into a process in the context of malware development.Mar 271
Mohideen Abdul KhaderMalware development with ChatGPTDisclaimer: There’s no need for concern; this exercise is purely aimed at harnessing ChatGPT for educational purposes.Oct 14, 2023
SpottedBaby Interdimensional InternetThis is a walkthrough for the HackTheBox machine called Baby Interdimensional Internet. It is rated as an easy box and I’ll agree that it…Jan 29
0x4C3DDOS Command Injection Vulnerabilities in Web ApplicationsThis comprehensive report investigates the critical web security concern known as OS command injection vulnerabilities in web applications…Aug 9, 2023
Dev·ediumUnderstanding HTTP Headers for Web Application SecurityA Closer Look at HTTP Headers and Web SecurityAug 2, 2023
Brian Baraka Kasamba CEHSIMPLE C++ MALWARE — Code InjectionProof of Concept , for educational purposes only.Mar 14, 2023