Thanks for ur support!

Recent posts

10 - Attacking Serialization

Attacking Serialization in Java, PHP and .NET

37 minute read

9 - XML Attacks

Tag Injection, XXE, Xpath Injection and More

25 minute read

8 - SQLI Filter Evasion

Bypassing Keyword and Function Filters

12 minute read

7 - SQL Injection

Learn techniques of exploitation for Mysql, MSSQL and Oracle Databases

15 minute read

6 - HTML5

How to exploit the new features of HTML5

16 minute read

5 - Cross-site request forgery (CSRF)

Discovering, Execution and Bypass techniques

14 minute read

4 - XSS Filter Evasion

Bypass blacklisting Filters, sanitization and Browser Filters

5 minute read

3 - Cross-site scripting (XSS)

How to discover and exploit a XSS vulnerability

12 minute read

2 - Evasion Basics

Base64 encoding, obfuscations, compressing, escapes and More

9 minute read

1 - Encoding & Filtering

Filtering with Regex, Types of encoding, Bypass WAF and More

8 minute read

Web application Penetration Tester eXtreme

My Review of the eWPTXv2 by INE

less than 1 minute read

6 - Movement, Pivoting and Persistence

Lateral Movement, Pivoting and Persistence using the C2 Covenant and Metasploit

24 minute read

5 - Windows Privilege Escalation

Navigating Windows Privesc Techniques: Kernel Exploits, Impersonation, Registry, DLL Hijacking and More

15 minute read

4 - Linux Privilege Escalation

Exploring Linux Privesc Techniques: Kernel Exploits, SUDO, SUID, Scheduled Tasks, NFS Root Squashing and More

7 minute read

3 - External Pentest Playbook

The full life cycle of an External Pentest: ROE, Osint, Attacking Login Portals, Report, Client Debriefs and More

7 minute read