InRevolutionaryMinded™ PublishingbyGabriel ProsserTHEY DISRESPECT TOU TO YOUR FACE AND YOU FOOLS ALLOW IT WITH GLEE… NETFLIX I.EMar 31
XM1945[Ice] Tryhackme 2020 Challenge Write-upDeploy & hack into a Windows machine, exploiting a very poorly secured media server.May 26, 2020
Cursed0n3Exploiting LLM APIs with excessive agency- walkthroughBurp suite lab for LLM section 1Jan 21Jan 21
Abdelwahab Ahmed ShandyInformation Disclosure : APPRENTICE : Information disclosure in error messagesWeb Security Academy >> Information disclosure >> Exploiting >> LabApr 26Apr 26
Rathin PatelData Collection Methods are becoming more exploitive — It’s time to revisit the “Be careful what…Sometimes knowing how something works even on a surface level can be the difference between you making a serious mistake or not. Like if…Jul 24, 2023Jul 24, 2023
InRevolutionaryMinded™ PublishingbyGabriel ProsserTHEY DISRESPECT TOU TO YOUR FACE AND YOU FOOLS ALLOW IT WITH GLEE… NETFLIX I.EMar 31
XM1945[Ice] Tryhackme 2020 Challenge Write-upDeploy & hack into a Windows machine, exploiting a very poorly secured media server.May 26, 2020
Cursed0n3Exploiting LLM APIs with excessive agency- walkthroughBurp suite lab for LLM section 1Jan 21
Abdelwahab Ahmed ShandyInformation Disclosure : APPRENTICE : Information disclosure in error messagesWeb Security Academy >> Information disclosure >> Exploiting >> LabApr 26
Rathin PatelData Collection Methods are becoming more exploitive — It’s time to revisit the “Be careful what…Sometimes knowing how something works even on a surface level can be the difference between you making a serious mistake or not. Like if…Jul 24, 2023
Yash Pawar @HackersParadiseExploiting the Shellshock (CVE-2014–6271) VulnerabilityShellshock, also known as Bashdoor, is a critical vulnerability that affects the Bash shell (versions 1.3 and above). Discovered in 2014…Oct 7
TheCrazyAcademicCharacter Chaos: Looking Beyond CRLF Injections and Finding Similar Attack Vectors to Manipulate…This research all began when I looked at a list of various ASCII characters in the standard and thought to my self “Could there be other…Feb 5, 2023
A.R MaheerUnrestricted upload of file with dangerous type in Aviatrix allows an authenticated user to execute…Similar APIs designed to upload files from authenticated users did not properly sanitize their destination input, allowing directory…Oct 9, 2021