🕵️♂️ How I Got Access to a UK Government Organization’s SMTP Server? 📧🚨While researching Google Dorking over my favorite cup of coffee ☕, I stumbled upon something unexpected — an exposed mail server belonging…10h ago10h ago
🗂️ Directory Listing: The Overlooked Gem in Web Exploitation 💎⚠️When we talk about web application vulnerabilities, names like SQL Injection, Cross-Site Scripting (XSS), and Remote Code Execution (RCE)…3d ago3d ago
🔥 How I Uncovered a Powerful SQL Injection in an Organisation’s Website 💻🚀While enjoying my hacker’s favourite drink — coffee ☕ — I came across some interesting parameters on an organisation’s website. Being…5d ago25d ago2
Breaking and Defending: Lessons from My Ransomware Project 🔐When my colleague, Hack-Bat, and I set out to create malware for our project, we wanted something both challenging and impactful. After…Mar 16Mar 16
Shortcut to Exploitation: Weaponizing .lnk Files for a Stealthy Reverse Shell 🎭💻While collaborating with my colleague Hack-Bat, we stumbled upon an intriguing attack vector — leveraging .lnk files to gain a reverse…Mar 13Mar 13
Dorking My Way In: How I Uncovered Mail Server Flaws 💡During my recent research on Google dorking and email protocols, I stumbled upon an intriguing question: Is it possible to combine the…Mar 7Mar 7
Hacking Made Easy: The Power of Google Dorking 🔍With my usual weapon — Hacker’s Coffee ☕ — I decided to explore Google in a different way: through the art of Google Dorking. It might…Mar 7Mar 7
The Untold Story of Email Authentication Protocols 🤔While hunting for vulnerabilities in an organization’s website, I hit a dead end after uncovering clickjacking. No new leads, no fresh…Mar 61Mar 61
🕵️ How We Got Our Simple Yet Powerful Vulnerability — The Power of Clickjacking 😏In the realm of cybersecurity, there’s a dangerous misconception: securing the backend is enough to protect an organization. But if the…Mar 6Mar 6