Category: Mix
Open Source Hacking Lab | Guide on File Inclusion Vulnerability and Path Traversal Attack in PHP Source link
Does Cybersecurity Require Programming? Source link
UMBC Cyberdawgs CTF: The Hacker One Source link
Bypassing a WAF by Finding the Origin IP Source link
Attacking Language Server JSON RPC Source link
It has become a tradition that I publish a review at the end of each year. Unlike previous years I…
Hacking CI/CD (Basic Pipeline Poisoning) Source link
ToolTime – Cloud Recon 1 Source link
Back in October, I found a couple of issues in Etsy, which when combined could be used in a click-jacking…
The EU Cyber Resilience Act aims to protect Europe from increasingly sophisticated cyber-threats. The first quarter of 2023 has seen…
we faced (w/ @celalerdik) an interesting ssti vulnerability on a bugcrowd’s program. we could show the traditional 49’ number when…
Advent of Cyber 2022: Day 16 SQLi’s the king, the carolers sing (Walkthrough) Source link