PinnedPublished inOSINT TeamSQL Injection vulnerability in CRMEB v.5.2.2 — $$$$ BountyCVE-2024–36837 :Sep 30, 202454Sep 30, 202454
PinnedUnauthenticated PHP Object Injection in GiveWP Plugin for WordPressCVE-2024–8353 (CVSS 10.0 rating) — $$$$ BountyOct 1, 20241073Oct 1, 20241073
PinnedHow to Troubleshoot and Fix Email Template Issues in DevelopmentReference Tools:Troubleshooting Tips:Cross-Client Compatibility:Fixes:Email Template Not Rendering at All:Troubleshooting TipsOct 17, 2024801Oct 17, 2024801
PinnedGoogle Safe Browsing Blacklisting Due to Website CompromiseWhen a website is compromised, it becomes a potential threat to visitors, leading to its inclusion in Google’s Safe Browsing blacklist…Aug 31, 2024313Aug 31, 2024313
PinnedWhat is WAF? & Secret Techniques to Bypass ItWAF (Web Application Firewall): A tool designed to filter and monitor HTTP/HTTPS traffic, preventing attacks on web applications at the…Sep 5, 202481Sep 5, 202481
CVE-2025–24813: Apache Tomcat Path Equivalence Vulnerability $$$$ BOUNTYDisclaimer: This document is for educational purposes only. Exploiting systems without authorization is illegal and punishable by law.2d ago1832d ago183
Published inInfoSec Write-upsGraphQL Vulnerabilities: A Complete Guide to Security Testing and Advanced Exploitation TechniquesDisclaimer: This document is for educational purposes only. Exploiting systems without authorization is illegal and punishable by law.4d ago14d ago1
Published inOSINT TeamEssential Links & Resources for SOC AnalystsDisclaimer: This document is for educational purposes only. Exploiting systems without authorization is illegal and punishable by law.4d ago4d ago
Testing for HTTP Verb Tampering: A Complete GuideDisclaimer: This document is for educational purposes only. Exploiting systems without authorization is illegal and punishable by law.6d ago6d ago
Published inOSINT TeamMastering Shodan Search Engine Dorks: A Comprehensive Guide for Security ResearchersDisclaimer: This document is for educational purposes only. Exploiting systems without authorization is illegal and punishable by law.Mar 81Mar 81