Overcoming Space Constraints in Exploit Development
A Guide to Staging Shellcode in Limited Buffer Scenarios
A Guide to Staging Shellcode in Limited Buffer Scenarios
How I found missing SRI using just curl and how it led to my first valid bug.
A Handy cheatsheet that you might require while writing some cool exploit scripts
Detailed blog on how to use the proxy configuration tool to stay anonymous
A Place to recall and revisit all the popular NMap commands
Deepdive into life of Aaron Swartz, the founder of reddit
A list of 60 most used linux commands for beginners
The New "God Mode" for Web RCE: Analyzing React2Shell Exploits and Attacker Tradecraft
A practical guide to Local and Remote File Inclusion attacks
A concise guide to Kerberoasting, a powerful technique for compromising AD service accounts.