US Treasury Breached By Hacktivists
Under Review
Under Review
Hi, if you’ve made it to this blogpost then I assume you have interest in security research. I’ve been doing some studying on XML external entity (XXE) vulnerabilities and felt like sharing some fu...
3 Cybersecurity AI Tools to Watch in Winter 2024 Artificial Intelligence (AI) is making a substantial impact across industries in 2024, with major players like Google unveiling Gemini, Apple intro...
Hi, throughout this repository you’ll find information on Open Source Intelligence Gathering that I hope can provide anyone with assistance to better their skills. I have the intention of publishin...
Hi, throughout this repository you’ll find information on Open Source Intelligence Gathering that I hope can provide anyone with assistance to better their skills. I have the intention of publishin...
2024 continues to be a year of surprises as we move into the earliest summer solstice in 228 years. Recently, security researchers have exposed multiple security vulnerabilities in WordPress plugin...
This is the first post in a tutorial series that will help showcase how trivial it can be for a hacker to exploit public-facing web applications. Throughout this series, I will lay out my thought p...
“龙年吉祥 (Lóng Nián Jí Xiáng): Good Luck for this Dragon Year” The year of the dragon has brought about many revelations across a variety of industries and cultures. One particular industry that ha...
Write-up for Hacker101 CTF Hints Flag0 Something looks out of place with checkout It’s always nice to get free stuff Flag1 There must be a way to administer the app Tools may help y...
Write-up for Hacker101 CTF Hints What was the first input you saw? Figuring out what platform this is running on may give you some ideas Code injection usually doesn’t work Methodology ...