Posts

Unrestricted File Upload and Bypassing Protection Mechanisms: Technical Details and Methods

HTTP Request Smuggling and Account Takeover Attack

Login Email Verification Bypass via /oauth/token

Local Privilege Escalation via EXE Hijacking

IDOR (Insecure Direct Object References) Vulnerability - Detailed Analysis

From Unauthenticated Stored XSS to RCE

MSSQL and NetExec: Technical Analysis and Practical Scenario

Privilege Escalation: Technical Scenario and Code Examples with Unquoted Service Paths

Cookie Theft Using XSS with PHP: Technical Review

OTP Bypass: Technical Review and Security Vulnerabilities