Homepage
Open in app
Sign in
Get started
Vault Infosec
We Vow Your Security
Follow
Our Cyber Stories
Classic Process Injection
Classic Process Injection
In this blog, we will see how the classic process Injection works and write your first process injection code. Before that, I recommend you…
0xmani
Oct 2, 2023
Understanding Process Injection
Understanding Process Injection
Process injection is used by a threat actor to inject their malicious code into the address space of a running process.
0xmani
Sep 26, 2023
RCE via Account Takeover
RCE via Account Takeover
In this blog, I am gonna share about a bug that I came across while performing VAPT for a private project. This is a CMS website that I…
Karthikeyan
Aug 25, 2023
How I found AWS Secret Key and Access Key via Threat Intelligence.
How I found AWS Secret Key and Access Key via Threat Intelligence.
First and foremost, begin to comprehend the web application’s business process and assemble the tech stacks of the applications. I have…
Karthikeyan
Jun 12, 2023
How to Exploit Log4j Vulnerability over the Internet
How to Exploit Log4j Vulnerability over the Internet
Welcome to this comprehensive guide on the log4j vulnerability. In this article, we will see what the log4j vulnerability is and how to…
Karthikeyan
May 24, 2023
Attacking Constrained Delegation
Attacking Constrained Delegation
Kerberos Delegation
0xmani
Jan 28, 2023
How I Found Business Logic Vulnerability in Google Pay
How I Found Business Logic Vulnerability in Google Pay
I hope everyone has an experience in using google pay. I used to travel by train so usually book my tickets via GPay. I had an idea of…
Gugan
Jun 7, 2022
About Vault Infosec
Latest Stories
Archive
About Medium
Terms
Privacy
Teams