PinnedPublished inOSINT TeamSQL Injection vulnerability in CRMEB v.5.2.2 — $$$$ BountyCVE-2024–36837 :Sep 30, 2024Sep 30, 2024
PinnedUnauthenticated PHP Object Injection in GiveWP Plugin for WordPressCVE-2024–8353 (CVSS 10.0 rating) — $$$$ BountyOct 1, 20243Oct 1, 20243
PinnedHow to Troubleshoot and Fix Email Template Issues in DevelopmentReference Tools:Troubleshooting Tips:Cross-Client Compatibility:Fixes:Email Template Not Rendering at All:Troubleshooting TipsOct 17, 20241Oct 17, 20241
PinnedGoogle Safe Browsing Blacklisting Due to Website CompromiseWhen a website is compromised, it becomes a potential threat to visitors, leading to its inclusion in Google’s Safe Browsing blacklist…Aug 31, 20243Aug 31, 20243
PinnedWhat is WAF? & Secret Techniques to Bypass ItWAF (Web Application Firewall): A tool designed to filter and monitor HTTP/HTTPS traffic, preventing attacks on web applications at the…Sep 5, 2024Sep 5, 2024
Published inInfoSec Write-upsGraphQL Vulnerabilities: A Complete Guide to Security Testing and Advanced Exploitation TechniquesDisclaimer: This document is for educational purposes only. Exploiting systems without authorization is illegal and punishable by law.1d ago1d ago
Published inOSINT TeamEssential Links & Resources for SOC AnalystsDisclaimer: This document is for educational purposes only. Exploiting systems without authorization is illegal and punishable by law.1d ago1d ago
Testing for HTTP Verb Tampering: A Complete GuideDisclaimer: This document is for educational purposes only. Exploiting systems without authorization is illegal and punishable by law.3d ago3d ago
Published inOSINT TeamMastering Shodan Search Engine Dorks: A Comprehensive Guide for Security ResearchersDisclaimer: This document is for educational purposes only. Exploiting systems without authorization is illegal and punishable by law.6d ago16d ago1
2025 OWASP Vulnerabilities Complete Guide for Security TesterAs cybersecurity threats continue to evolve, the Open Web Application Security Project (OWASP) updates its list of top vulnerabilities…Mar 5Mar 5