Pradeep KumarinInfoSec Write-upsUnlocking OAuth SecurityIn this blog, we will uncover the different oauth security implications on both the client applications and the oauth server.Aug 26
Wilklins NyattengSQLMap — TryHackMe WriteUpLearn about and use Sqlmap to exploit the web applicationJul 10, 2023
Quintius WalkerinILLUMINATIONBrute Forcing Your SecretsBecause drastic times call for drastic measures.Aug 15Aug 15
Firas FatnassiCross-Tenant Information Disclosure: Unraveling Microsoft Connections, Custom Connectors, and OAuth…This article is about a vulnerability I recently discovered in the Microsoft Power Automate Platform, which involved chaining exploits…Aug 4, 2023Aug 4, 2023
Muhammad RaheemSource TryHackMe RoomSource is a tryhackme room that is a boot2root CTF and is vulnerable with Webmin a web based system configuration tool.Mar 6Mar 6
Pradeep KumarinInfoSec Write-upsUnlocking OAuth SecurityIn this blog, we will uncover the different oauth security implications on both the client applications and the oauth server.Aug 26
Wilklins NyattengSQLMap — TryHackMe WriteUpLearn about and use Sqlmap to exploit the web applicationJul 10, 2023
Quintius WalkerinILLUMINATIONBrute Forcing Your SecretsBecause drastic times call for drastic measures.Aug 15
Firas FatnassiCross-Tenant Information Disclosure: Unraveling Microsoft Connections, Custom Connectors, and OAuth…This article is about a vulnerability I recently discovered in the Microsoft Power Automate Platform, which involved chaining exploits…Aug 4, 2023
Muhammad RaheemSource TryHackMe RoomSource is a tryhackme room that is a boot2root CTF and is vulnerable with Webmin a web based system configuration tool.Mar 6
Mudhalai MrinDeveloper Community SASTRAPwning PHP Websites: RFI & LFIPHP is one of the widely used languages for web development ( more than 60% ) which makes it one of the most targeted ones.Mar 23, 2021
Alp BeyazgülWeb Development Security Checklist: Are You Protected?Web Development Security Checklist: Are You Protected ?Jan 25
umair nehriinRIXED_LABSSession Hijacking: A brief OverviewIntroduction to Session HijackingFeb 3, 2021