Cap starts by identifying an IDOR vulnerability on its hosted website. Using …
Oct 14, 2021
·
6 min readMoodle exploitation using CVEs
Sep 16, 2021
·
11 min readExploiting the backdoor planted in PHP 8.1-dev
Aug 28, 2021
·
4 min readCode execution with path traversal
Aug 06, 2021
·
9 min readHands on with ShellShock vulnerability
Jul 13, 2021
·
4 min readA ctf for beginners, can you root me?
Jul 02, 2021
·
3 min readDC-6 starts off by enumerating usernames from a WordPress website and use a …
May 30, 2021
·
8 min readExample of a phishing attack and PyPI package exploitation
Apr 28, 2021
·
10 min readExploiting OpenNetAdmin vulnerability and sudo nano
Apr 02, 2021
·
6 min read