
SSRF Attack: Trials and Tribulations
I mostly wanted to share this post not because it’s a novel and unique attack, but to show the thought process of attacking this particular
I mostly wanted to share this post not because it’s a novel and unique attack, but to show the thought process of attacking this particular
System information about Windows Defender. Using reflection in PowerShell to invoke Win32 API calls from remote PowerShell file invoked by Elixir’s interactive shell. Insert shellcode
Overpass has been hacked! Can you analyse the attacker’s actions and hack back in? Overpass has been hacked! Can you analyse the attacker’s actions and
What happens when some broke CompSci students make a password manager? What happens when a group of broke Computer Science students try to make a