SQL Injection: How Attackers Exploit It and How to Defend Against ThemSQL Injection is one of the most common and dangerous web vulnerabilities today, impacting a wide range of applications. This type of…Oct 17, 2024113Oct 17, 2024113
Low-Level Attacks: Crafting Payloads and Bypassing Detection MechanismsIn cybersecurity, low-level attacks represent a sophisticated approach to exploiting system vulnerabilities. These attacks operate beneath…Oct 14, 202451Oct 14, 202451
U.A. High School | WriteUpU.A High School Room a CTF challenge on Tryhackme aimed to make you practice new techniques and toolkitsOct 8, 2024103Oct 8, 2024103
Metasploitable 2 Walkthrough by TirexV2Metasploitable 2 is a test environment that provides a secure place to perform penetration testing and security research. For your test…May 8, 2024100May 8, 2024100