Sakshi RathoreDependency Confusion: A Namespace Takeover StoryHello. I am Sakshi Rathore, a Cyber Security Student and Bug Bounty Hunter.Sep 5
Muhammad AliReflected XSS in a canonical link tagA Reflected Cross-Site Scripting (XSS) vulnerability in the canonical link tag refers to an attack where an attacker injects malicious code…Oct 27, 2023
AnkitsinhaHTB Walkthrough: HeistHeist is an easy difficulty Windows box with an portal accessible on the web server, from which it is possible to gain Cisco password…Aug 30Aug 30
Ahmet Talha ŞeninInfoSec Write-upsIntroduction to Web Applications HTB CTFIntroduction to Web Applications HTBJul 18, 20231Jul 18, 20231
Sakshi RathoreDependency Confusion: A Namespace Takeover StoryHello. I am Sakshi Rathore, a Cyber Security Student and Bug Bounty Hunter.Sep 5
Muhammad AliReflected XSS in a canonical link tagA Reflected Cross-Site Scripting (XSS) vulnerability in the canonical link tag refers to an attack where an attacker injects malicious code…Oct 27, 2023
AnkitsinhaHTB Walkthrough: HeistHeist is an easy difficulty Windows box with an portal accessible on the web server, from which it is possible to gain Cisco password…Aug 30
Ahmet Talha ŞeninInfoSec Write-upsIntroduction to Web Applications HTB CTFIntroduction to Web Applications HTBJul 18, 20231
Saumya KasthuriPart 2- 1. Information GatheringOpen Source Reconnaissance (OSINT) and Google DorksAug 22