Install Nuclei | Tool ⌘ Read more
Install Subfinder |Tool ⌘ Read more
Web Application Penetration Checklist ⌘ Read more
Subdomain takeover via AWS s3 bucket ⌘ Read more
Understanding the CrowdStrike 2024 Global Threat Report ⌘ Read more
Prevent Cross-Site Scripting Attacks in Node.js
A step-by-step guide on how to protect your website from XSS attacks.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/prevent-cross-site-scripting-attacks-in-node-js-6b6fa5dd689f?sou … ⌘ Read more
HTB: Bizness walkthrough ⌘ Read more
HTB Business CTF 2024 — Submerged (Fullpwn)— Write-up ⌘ Read more
CozyHosting HTB Easy | Walkthrough ⌘ Read more
Blind SQL Injection: Uncovering Administrator Password One Character at a Time-Lab9 ⌘ Read more
Unlocking Superpowers: How to Gain Root Access in Ubuntu and Defeat ‘User not sudoers’ Error ⌘ Read more
All About API Security Pentesting ⌘ Read more
Intrusion Analysis: How to Fully Investigate Cyber Security Attacks
Learn how to perform intrusion analysis in this comprehensive guide, including a four-step process, tips and tricks, and practical…
[Continue read … ⌘ Read more
Are you capable of mastering the entire system and exploiting all vulnerabilities?
TCM Academy Walkthrough : A Hands-On Experience ⌘ Read more
THM:A Comprehensive Guide to the Pickle Rick TryHackMe Challenge ⌘ Read more
Fingerprinting Databases: Error based SQLi (Oracle, MySQL, MS) ⌘ Read more
CVE-2023–52424: The WiFi SSID Confusion Attack Explained
CVE-2023–52424, also known as the SSID Confusion Attack, has brought new challenges to wireless network security.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.c … ⌘ Read more
The Ultimate Cyber Security Weapon: SharePoint Lists ⌘ Read more
Shhh…Don’t Tell the Database Admin: SQLi Lab Exploits ⌘ Read more
How Search Engines Operate and Utilize Hidden Content
How I Got My First Bounty: The Exciting Story of My Bug Bounty Breakthrough ⌘ Read more
CVE-2024–4761: Exploiting Chrome’s JavaScript Engine Highly Exploited (PoC presented)
Discover the technical breakdown of CVE-2024–4761, an out-of-bounds write vulnerability in Chrome’s V … ⌘ Read more
TryHackMe - Network Services ⌘ Read more
Enriching Microsoft Sentinel Incidents with AlienVault OTX Threat Intelligence Playbook ⌘ Read more
BSQL Injection Shenanigans 2 ⌘ Read more
Google Cybersecurity Certification: Your Gateway to a New Career ?
Discover how the Google Cybersecurity Certification on Coursera can help you pivot to a cybersecurity career. Learn from my personal…
[Continue reading on … ⌘ Read more
CyberLens — TryHackMe Writeup ⌘ Read more
Session fixation | Cookie injection leading to ATO Write-Up ⌘ Read more
Microsoft Activation Scripts (MAS): Guide to Freely Activating Windows and Office
Discover how to activate Windows and Office using Microsoft Activation Scripts (MAS) with methods like HWID, … ⌘ Read more
Scheduled Network Activity Reports using a Simple set of Tools ⌘ Read more
Bypass Firewall by Finding Origin IP ⌘ Read more
Root user account takeover via SQL Injection ⌘ Read more
Honeypots 102: Setting up a SANS Internet Storm Center’s DShield Honeypot ⌘ Read more
JNDI Injection — The Complete Story ⌘ Read more
Hundreds of companies’ internal data exposed — Part 2: The FreshService misconfiguration ⌘ Read more
HacktheBox Starting Point: Explosion Walkthrough ⌘ Read more
5 Ways I Can Find Your Deleted Files as An Ethical Hacker! ⌘ Read more
For Business Reasons | TryHackMe Write-Up ⌘ Read more
BSQL Injection Shenanigans ⌘ Read more
Bypassing UAC ⌘ Read more
My LLM Bug Bounty Journey on Hugging Face Hub via Protect AI
From Informative Rejection to Black Hat Briefing
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/my-llm-bug-bounty-journey-on-hugging-face-hub-v … ⌘ Read more
Hacking into 30+ tesla cars around the world using a third party software ⌘ Read more
Creative | TryHackMe Write-Up ⌘ Read more
Hook, Line, and Sinker: Navigating the Waters of Phishing Attacks in 2024 ⌘ Read more
My Hunt: Discovering Microsoft Bugs
Navigating the Terrain of Microsoft’s Software: Insights from a Bug Hunter
A Guide To Securing Your Remote Access Using SSH Keys ⌘ Read more
WolvCTF 2024: Forensics Challenges ⌘ Read more
Hacking Web Meeting/Webinar App ⌘ Read more