Unveiling the Sneaky CSV Injection: VDP vs. Objective-Based Offensive TacticsWelcome to the world of cybersecurity hide-and-seek, where we’re on a mission to find and fix sneaky computer bugs. But not all bugs are…Jun 1Jun 1
A Story of GraphQL ; Tuning Out Introspection VulnerabilitiesEver seen a one-man band at a crowded bar? Juggling instruments, stomping on pedals, singing their heart out — it’s a chaotic symphony, a…Mar 11Mar 11
The TROJANIZED COMPONENT: DISSECTING THE BROWSER EXTENSION AND CTI GREAT EFFECTSWithout question, 2020 was defined by the global coronavirus pandemic (GCP). So to speak Not only has the virus had huge public health…Feb 20, 2021Feb 20, 2021
PowerShell — Data Ex-filtration over DNS (OOB)increasingly, companies considering security a top priority and ex-filtration of data are more restricted.Aug 17, 2020Aug 17, 2020
Simple Executable HTTP Server for pentesterrecently i was in engagement and needed to download large file from the compromised machine , i was unable to get it from TFTP neither…Oct 22, 2018Oct 22, 2018
TTY SHELL FROM ONE LINE OF PHP CODEwe all know how important to gain tty ( teletype terminal ) shell during a penetration testing.Apr 18, 2018Apr 18, 2018
Hashcat In Virtualization environmentwe all know hashcat utilize gpu and to work with cpu in virtualbox or vmware you will need to install the followingApr 17, 2018Apr 17, 2018
using Mimikatz to get cleartext password from offline memory dumprequirements : new version of kali mimikatz : wget https://raw.githubusercontent.com/dfirfpi/hotoloti/master/volatility/mimikatz.pyApr 11, 20181Apr 11, 20181
kaizen-ctf 2018 — Reverse Engineer usb keystrok from pcap fileyesterday was a great experience for me to attend all kind of joubert , one of the challenges i could not solve and understand in the…Feb 27, 20183Feb 27, 20183