enigma_Reflected XSS on Gaming Blog WebsiteI found a reflected XSS vulnerability on a website I used to frequent when playing a text-based MUD (multi user dungeon).1d ago
InAWS Tipby1dayHow I Exploited Amazon Cognito Misconfigurations to Access Confidential S3 DataIntroduction4d ago3
BerserkerHow Two Hardcoded Credentials Led To Payment System Takeover, Exposed 20,000 Credit Cards & Enabled…Introduction:Dec 5Dec 5
InDeep. Sweet. Valuable.byMartynas Justina SWEET.pub🧡 Deep Writers: Meet Your New Best Friend! 🐝🧡 Dear Deep Writers,4d ago174d ago17
enigma_Reflected XSS on Gaming Blog WebsiteI found a reflected XSS vulnerability on a website I used to frequent when playing a text-based MUD (multi user dungeon).1d ago
InAWS Tipby1dayHow I Exploited Amazon Cognito Misconfigurations to Access Confidential S3 DataIntroduction4d ago3
BerserkerHow Two Hardcoded Credentials Led To Payment System Takeover, Exposed 20,000 Credit Cards & Enabled…Introduction:Dec 5
InDeep. Sweet. Valuable.byMartynas Justina SWEET.pub🧡 Deep Writers: Meet Your New Best Friend! 🐝🧡 Dear Deep Writers,4d ago17
1dayHow I Hacked Into a Nationwide University Database System Exposing Thousands of Student RecordsINTRODUCTIONSep 2245
Declan MiddletonHow I Hacked Into my Schools Database System Exposing Hundreds of Student data.Hi there,5d ago1
amshiJohn The Ripper| tryhackme walkthroughN.B: You would have to first identify what type of hash it is then insert the type in the format part of the command & to identify the hash…Jan 31