Microsoft Azure -Enabling Diagnostic for Log Analytics Resource.Hello Member,Jan 19, 2024Jan 19, 2024
WordPress Bug Bounty ReportIn this article, we will discuss WordPress security, common attacks, and present 25 disclosed reports from their public bug bounty program.Jun 21, 2023Jun 21, 2023
Nuclei: Automating Web Application[ Cheat Sheet]Nuclei is an open-source framework designed for automating the detection and exploitation of vulnerabilities in web applications and other…Jun 21, 2023Jun 21, 2023
Blind OS Command Injection via Activation Request!!Hello everyone, in this article I’m going to share with you how I found Blind OS Command Injection vulnerability via account activation…Jun 20, 20231Jun 20, 20231
Exploiting SSRF Vulnerability to Gain Unauthorized Access to AWS DataWelcome back hackers, and let’s jump right into part 2 of our SSRF exploitation adventure.Jun 20, 20231Jun 20, 20231
Using ChatGPT to write nuclei exploits !!ChatGPT and AI have been experiencing their best days for several months. We can find their usage in truth everywhere. This has not…Jun 20, 2023Jun 20, 2023
Open Redirection to Reflected Cross-Site ScriptingMost of the time if you find open redirection on login functionality there are chances to escalate it to RXSS.Jun 20, 20232Jun 20, 20232
Refleced XSS — CloudFlareWAF Bypass!Sometimes simple payloads help to bypass the WAF filter.Jun 20, 20232Jun 20, 20232
Find SSRF, LFI, XSS using httpx, waybackurls, gf,gau qsreplaceHello Hackers!!Jun 20, 20235Jun 20, 20235
Recon For Web Pen-Testing!!Reconnaissance, or recon for short, is the process of gathering information about a target to identify vulnerabilities and potential attack…Apr 30, 20235Apr 30, 20235