InR3d Buck3TbyNairuz AbulhulRed Teaming in Cloud: Leverage Azure FrontDoor CDN for C2 RedirectorsEvading Detection: Obfuscating C2 Infrastructure with Azure FrontDoorJan 11
InInfoSec Write-upsbySWRoot user account takeover via SQL InjectionUse a blind SQL injection to Admin account takeoverMay 131
CaptinSHArky(Mahdi🇹🇳)“ part 2 Beginner’s Bug Bounty Methodology: A Journey from Writeups to Real-World Application”{إِنَّ اللَّهَ وَمَلائِكَتَهُ يُصَلُّونَ عَلَى النَّبِيِّ يَا أَيُّهَا الَّذِينَ آمَنُوا صَلُّوا عَلَيْهِ وَسَلِّمُوا تَسْلِيمًا}Sep 17Sep 17
InR3d Buck3TbyNairuz AbulhulCrackMapExec in Action: Enumerating Windows Networks (Part 2)Strategically Mapping Targets inside the Internal NetworkSep 27, 2023Sep 27, 2023
Motasem HamdanFree OSINT Mini Course | Learn OSINT in Under Two HoursIn this OSINT mini course, I tried to cover the basic subjects of open source intelligence. This mini course is a curated and tailored…Aug 3Aug 3
InR3d Buck3TbyNairuz AbulhulRed Teaming in Cloud: Leverage Azure FrontDoor CDN for C2 RedirectorsEvading Detection: Obfuscating C2 Infrastructure with Azure FrontDoorJan 11
InInfoSec Write-upsbySWRoot user account takeover via SQL InjectionUse a blind SQL injection to Admin account takeoverMay 131
CaptinSHArky(Mahdi🇹🇳)“ part 2 Beginner’s Bug Bounty Methodology: A Journey from Writeups to Real-World Application”{إِنَّ اللَّهَ وَمَلائِكَتَهُ يُصَلُّونَ عَلَى النَّبِيِّ يَا أَيُّهَا الَّذِينَ آمَنُوا صَلُّوا عَلَيْهِ وَسَلِّمُوا تَسْلِيمًا}Sep 17
InR3d Buck3TbyNairuz AbulhulCrackMapExec in Action: Enumerating Windows Networks (Part 2)Strategically Mapping Targets inside the Internal NetworkSep 27, 2023
Motasem HamdanFree OSINT Mini Course | Learn OSINT in Under Two HoursIn this OSINT mini course, I tried to cover the basic subjects of open source intelligence. This mini course is a curated and tailored…Aug 3
InInfoSec Write-upsbyMedusaBroken Object Level Authorization Vs. Broken Functionality Level Authorization | API Hacking |In this blog, we will explore two significant security vulnerabilities: Broken Object Level Authorization (BOLA) and Broken Functionality…Oct 17, 20231
InDev GeniusbyBarış Ekin YıldırımKubernetes Goat: Attack & Defense Guide — Scenario 4: Container escape to the host systemIn today’s scenario, we will explore how to escape from a container to the host system, understand the mechanism of this vulnerability…Jul 4
Motasem HamdanAurora EDR for Cybersecurity & Incident Response | TryHackMe Aurora EDRIn this post , we covered Aurora endpoint and detection response agent tool that is used in detecting and responding to cyber security…May 16