How to Access Another’s Systems Remotely like Hacker [Ethical Hacking]This tutorial guide you how to access any computer remotely like a hacker. Get remote access of any system using this hacking technique.4h ago4h ago
Linux Privilege Escalation [Part-1] | EJPT NotesLinux Privilege Escalation Techniques (full tutorial) , In which how to gain root user access after gaining foothold.4d ago4d ago
Anonymous access on SMB [Ejpt exam notes]How to dump passwords using anonymous access vulnerability of SMB.Mar 7Mar 7
🛠Account Takeover on Hackerone using Token leakage🛠By using Token leakage vulnerability , attacker can easily reset accounts password and get access over the accounts. This vulnerability…Feb 27Feb 27
Published inInfoSec Write-upsJUST CRASHED SYSTEM USING IMAGE AND GOT BOUNTY $ 500This is easy and impactful vulnerability that might be a cause of DOS attack. Crash target system and lot of things basically its working…Feb 262Feb 262
$50k BOUNTY JUST FOR GITHUB TOKEN LEAKSGot $50K Bounty Just for Github token leaks. This is big bounty for token leaks.Feb 241Feb 241
Administrator Account TakeoverIn this article we learn how wordpress website leaks admin PII for account takeoverFeb 232Feb 232
Published inSystem WeaknessJavaScript for Hackers: A Full TutorialJavaScript is not just for front-end development or building interactive websites. Hackers and security professionals also use JavaScript…Feb 18Feb 18
A Beginner’s Guide to Bash [Special for HackerBash (Bourne Again SHell) is a widely used command-line shell for Unix-like systems, such as Linux and macOS. It’s often used for system…Feb 17Feb 17
DAY[4/30] CSRF (Cross-Site Request Forgery): Exploitation and Prevention in depthIntroductionFeb 6Feb 6