AnonymousshettyUncovering Sensitive Information: A Case Study on a Government WebsiteIntroduction: As a security researcher, uncovering vulnerabilities that could compromise sensitive information is a critical part of my…Jul 31
Rajan KshedalWeb Enumeration -WPScanWPScan which is also an automated tool for web enumeration…Nov 4, 20221
Kevin PereiraHack The Box: TartarsauceToday we will get our hands on a machine called TartarSauce. This machine focuses on exploiting vulnerable wordpress pluginJun 30Jun 30
Motoko AyanamiA Learning Journey: Attempting to Turn a WordPress Theme CVE into a PoCOne evening, while participating in a public bug bounty program, I encountered an outdated WordPress website within scope. I decided to run…Jun 18Jun 18
Ian MuthuriUnveiling WordPress Vulnerabilities: A Comprehensive Guide to Using WPScanIntroductionAug 14, 2023Aug 14, 2023
AnonymousshettyUncovering Sensitive Information: A Case Study on a Government WebsiteIntroduction: As a security researcher, uncovering vulnerabilities that could compromise sensitive information is a critical part of my…Jul 31
Rajan KshedalWeb Enumeration -WPScanWPScan which is also an automated tool for web enumeration…Nov 4, 20221
Kevin PereiraHack The Box: TartarsauceToday we will get our hands on a machine called TartarSauce. This machine focuses on exploiting vulnerable wordpress pluginJun 30
Motoko AyanamiA Learning Journey: Attempting to Turn a WordPress Theme CVE into a PoCOne evening, while participating in a public bug bounty program, I encountered an outdated WordPress website within scope. I decided to run…Jun 18
Ian MuthuriUnveiling WordPress Vulnerabilities: A Comprehensive Guide to Using WPScanIntroductionAug 14, 2023
Syed Ali HamzaBreaking Ground: My Maiden Bug Discovery and Its RewardI was being asked to test a WordPress based Web Application where a normal user can create and manage different events, edit and delete his…Mar 6
Vishal BarotHow to effectively hunt for vulnerabilities in Wordpress SitesHi Sleepyheads! Miss me?May 24, 20225