Amit NigamHTTP Requests using Python — A Reference ArticleMaking HTTP requests is an essential skill for penetration testers, hackers, security researchers and developers. Web exploit development…Dec 3
Ahmad Hassan RDiscovering Zero-day Vulnerabilities using Coverage-Guided Fuzzing with AFL++IntroductionNov 23Nov 23
FebinPwn Challenges writeup — RVCExIITB CTFHello PWNers, This is a walkthrough article for the binary exploitation/PWN challenges from RVCExIITB CTF competition.Jun 15Jun 15
Amit NigamHTTP Requests using Python — A Reference ArticleMaking HTTP requests is an essential skill for penetration testers, hackers, security researchers and developers. Web exploit development…Dec 3
Ahmad Hassan RDiscovering Zero-day Vulnerabilities using Coverage-Guided Fuzzing with AFL++IntroductionNov 23
FebinPwn Challenges writeup — RVCExIITB CTFHello PWNers, This is a walkthrough article for the binary exploitation/PWN challenges from RVCExIITB CTF competition.Jun 15
InMII Cyber Security Consulting ServicesbyLinuz Tri EriantoDelving into Binary Exploitation: A Beginner’s GuideBinary ExploitationMar 27
RocketMe Up CybersecurityWebAssembly for Browser-Based RCE (Remote Code Execution) AttacksExploring WebAssembly’s exploitation for browser-based RCE attacks, implications, and mitigation strategies.Nov 3