HTB Cyber Apocalypse CTF 2024 — Misc ⌘ Read more
HTB Cyber Apocalypse CTF 2024 — Forensics ⌘ Read more
Finding the hidden function led to a $300 IDOR ⌘ Read more
The Ultimate Guide to Red Teaming: Inside “A-poc/RedTeam-Tools”
Explore the comprehensive toolkit of over 130+ resources for red teaming activities in the A-poc/RedTeam-Tools GitHub repository. From…
[Continue reading on InfoSe … ⌘ Read more
Find Blind XSS like a pro. ⌘ Read more
13.12 Lab: Reflected DOM XSS — Cross Site Scripting | 2024 ⌘ Read more
Exploring the PinePhone: A Tech Enthusiast’s Dream for Privacy and Hacking
From Unboxing to Unique Use Cases: My Journey with the PinePhone and How It Stacks Up Against the FlipperZero
[Cont … ⌘ Read more
TryHackMe writeup: Digital Forensics Case B4DM755
In this writeup, I play the role as first responder, and investigate the possible theft of a company’s software product.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/tryhackme-w … ⌘ Read more
All about Ethical Hacking ⌘ Read more
4 Ways Cybercrime Could Impact Your Loan Business ⌘ Read more
Story of Lock up users’ account by DOS attack cost $1,100 ⌘ Read more
Practical Exploitation of XXE(CVE-2018–8033) and Mitigating in Apache OFBiz ⌘ Read more
PwnAdventure: A Unique Blend of MMORPG and Cybersecurity Training
Dive into the world of PwnAdventure, an intentionally vulnerable MMORPG designed to challenge cybersecurity enthusiasts and educate game…
[Continue readi … ⌘ Read more
How North Korean Hackers Are Robbing Millions from Banks ⌘ Read more
User Enumeration Techniques and Tactics In an Active Directory Pentesting Engagement. ⌘ Read more
LLM AI Security Checklist ⌘ Read more
Mastering WordPress Penetration Testing: A Step-by-Step Guide ⌘ Read more
$600 Simple MFA Bypass — Graphql ⌘ Read more
Mastering Scapy for Network Security: A Hands-On Guide to Scanning and DNS Reflection
Dive into the world of network security with our hands-on guide to using Scapy for scanning an … ⌘ Read more
My Report Summaries #1: Project manager can see & download all users’ login history at redacted app… ⌘ Read more
SANS Offensive CTF — JavaScript☕::001–004 ⌘ Read more
SANS Offensive CTF - Taskist:: 01–04 ⌘ Read more
How I Found Multiple XSS Vulnerabilities Using Unknown Techniques ⌘ Read more
How to Disappear Online: A Step-by-Step Guide to Becoming a Digital Ghost
This guide is for educational purposes only. Always follow the laws in your jurisdiction
[Continue reading on InfoSec Write-ups » … ⌘ Read more
PenTestGPT: The Future of Automated Penetration Testing ?
Discover how PenTestGPT revolutionizes cybersecurity through automated penetration testing, leveraging ChatGPT’s power for enhanced…
[Continue reading on InfoSec Write-ups »](https … ⌘ Read more
Revolutionizing Network Protocol Testing: A New Era of Validation
“Towards verification of QUIC and its extensions”
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/revolutionizing-network-protocol … ⌘ Read more
11.5 Lab: Exploiting blind XXE to exfiltrate data using a malicious external DTD | 2024 ⌘ Read more
HackerGPT: The Cool AI Hacker Buddy Every Cyber Pro Needs ?
Dive into the world of HackerGPT, your next AI sidekick in cybersecurity. Discover how it’s changing the game for hackers and security…
[Continue reading on InfoSec Write-ups » … ⌘ Read more
ISO 27001 Essentials: Protecting Your Digital Assets ⌘ Read more
From Recon to Crack: Navigating Password Hacking with CUPP, Sherlock & Hydra
Unlock the secrets of CUPP, the go-to tool for generating personalized wordlists for password cracking. Learn how to use CUPP to … ⌘ Read more
bersecurity11.6 Lab: Exploiting blind XXE to retrieve data via error messages | 2024 ⌘ Read more
BYPASSING PAYMENTS IN APPLE FOR FREE TRAILS FOR LIFETIME ⌘ Read more
10.4 Lab: SSRF with filter bypass via open redirection vulnerability | 2024 ⌘ Read more
Missed IWCON 2023? Catch Recorded Expert Sessions Here (Pt. 5) ⌘ Read more
3 Mistakes Every Beginner Ethical Hacker Makes ⌘ Read more
10 DNS Enumeration Tips & Tricks ⌘ Read more
A Beginner’s Guide to DNS Reconnaissance (Part 1) ⌘ Read more
Missed IWCON 2023? Catch Recorded Expert Sessions Here (Pt. 4) ⌘ Read more
Escalation of Windows Privilege: Kernel Exploit. ⌘ Read more
Mastering ARP Cache Poisoning with Scapy: A Step-by-Step Tutorial
Dive into the world of network security with our hands-on guide to ARP cache poisoning using Scapy.
[Continue reading on InfoSec Write-ups »](https://inf … ⌘ Read more
Mastering Samba (SMB) Exploitation: A Comprehensive Pentesting Guide
Dive deep into the world of Samba hacking with this expert guide. From identifying vulnerabilities to practical exploitation techniques…
[Continue reading on … ⌘ Read more
Spoofing User-Agents: A neat trick to outsmart Microsoft ⌘ Read more
I took over 10 Million Accounts, Easy API Hacking ⌘ Read more
The Domino Effect: Strategies to Prevent Supply Chain Cyber Disruptions ⌘ Read more
How to Create a Local Kubernetes Cluster: Terraform and Ansible
Learn how to create your very own local Kubernetes cluster automatically using Terraform, Ansible, and the power of infrastructure as code.
[Continue reading … ⌘ Read more
From Encryption to Decryption: LockBit Ransomware’s Shutdown
TLDR: LockBit ransomware surfaced in 2019, posing a significant threat. However, recent collaborative efforts led by Europol and law…
[Continue reading on InfoSec Write-ups »](http … ⌘ Read more