Category: Mix

Ideal Tasks and Use-Cases · rez0
15
Mar
2023

Ideal Tasks and Use-Cases · rez0

I’ve been using ChatGPT for lots of hacking or engineering tasks. It’s extremely useful and much faster than executing on…

Automating Permission Checks Using OpenAPI Security Scanner?
15
Mar
2023

Automating Permission Checks Using OpenAPI Security Scanner?

Automating Permission Checks Using OpenAPI Security Scanner? Source link

netcup-xss
15
Mar
2023

AWAE Course and OSWE Exam Review – RCE Security

This is a review of the Advanced Web Attacks and Exploitation (WEB-300) course and its OSWE exam by Offensive-Security. I’ve…

Broken Access Control - Lab #7 User ID controlled by request parameter | Short Version
15
Mar
2023

Broken Access Control – Lab #7 User ID controlled by request parameter | Long Version

Broken Access Control – Lab #7 User ID controlled by request parameter | Long Version Source link

Dangerous Code Hidden in Plain Sight for 12 years
15
Mar
2023

Dangerous Code Hidden in Plain Sight for 12 years

Dangerous Code Hidden in Plain Sight for 12 years Source link

Tweet DNS Tools
15
Mar
2023

DNS Tools Comparison

The Story [EDIT 26/04/22] – I added a note on my personal conclusion about Amass with a note from a…

Server-Side Prototype Pollution Scanner | Blog
15
Mar
2023

Server-Side Prototype Pollution Scanner | Blog

Gareth Heyes | 13 March 2023 at 15:00 UTC We recently published some research on server-side prototype pollution where we…

Ohne Titel
15
Mar
2023

[BugBounty] Decoding a $😱,000.00 htpasswd bounty

tldr; A Private Bug Bounty Program had a globally readable .htpasswd file. I cracked the DES hash, got access to…

Open Source Hacking Lab | Guide on File Inclusion Vulnerability and Path Traversal Attack in PHP
15
Mar
2023

Open Source Hacking Lab | Guide on File Inclusion Vulnerability and Path Traversal Attack in PHP

Open Source Hacking Lab | Guide on File Inclusion Vulnerability and Path Traversal Attack in PHP Source link

Does Cybersecurity Require Programming?
15
Mar
2023

Does Cybersecurity Require Programming?

Does Cybersecurity Require Programming? Source link

UMBC Cyberdawgs CTF: The Hacker One
15
Mar
2023

UMBC Cyberdawgs CTF: The Hacker One

UMBC Cyberdawgs CTF: The Hacker One Source link

Bypassing a WAF by Finding the Origin IP
15
Mar
2023

Bypassing a WAF by Finding the Origin IP

Bypassing a WAF by Finding the Origin IP Source link