Thanks for ur support!
Recent posts
10 - Attacking Serialization
Attacking Serialization in Java, PHP and .NET
9 - XML Attacks
Tag Injection, XXE, Xpath Injection and More
8 - SQLI Filter Evasion
Bypassing Keyword and Function Filters
7 - SQL Injection
Learn techniques of exploitation for Mysql, MSSQL and Oracle Databases
6 - HTML5
How to exploit the new features of HTML5
5 - Cross-site request forgery (CSRF)
Discovering, Execution and Bypass techniques
4 - XSS Filter Evasion
Bypass blacklisting Filters, sanitization and Browser Filters
3 - Cross-site scripting (XSS)
How to discover and exploit a XSS vulnerability
2 - Evasion Basics
Base64 encoding, obfuscations, compressing, escapes and More
1 - Encoding & Filtering
Filtering with Regex, Types of encoding, Bypass WAF and More
Web application Penetration Tester eXtreme
My Review of the eWPTXv2 by INE
6 - Movement, Pivoting and Persistence
Lateral Movement, Pivoting and Persistence using the C2 Covenant and Metasploit
5 - Windows Privilege Escalation
Navigating Windows Privesc Techniques: Kernel Exploits, Impersonation, Registry, DLL Hijacking and More
4 - Linux Privilege Escalation
Exploring Linux Privesc Techniques: Kernel Exploits, SUDO, SUID, Scheduled Tasks, NFS Root Squashing and More
3 - External Pentest Playbook
The full life cycle of an External Pentest: ROE, Osint, Attacking Login Portals, Report, Client Debriefs and More