HackTheBox - Cap
Cap starts by identifying an IDOR vulnerability on its hosted website. Using this IDOR, I can obtain …
Cap starts by identifying an IDOR vulnerability on its hosted website. Using this IDOR, I can obtain …
Moodle exploitation using CVEs
Exploiting the backdoor planted in PHP 8.1-dev
Code execution with path traversal
Hands on with ShellShock vulnerability
A ctf for beginners, can you root me?
DC-6 starts off by enumerating usernames from a WordPress website and use a brute-force attack …
Example of a phishing attack and PyPI package exploitation
Exploiting OpenNetAdmin vulnerability and sudo nano