HOW TO CREATE GHIBLI STUDIO IMAGE IN FREEIn this tutorial we’ll learn about Ghibli studio image using ChatGPT.12h ago112h ago1
Published inSystem WeaknessAdvanced Techniques to Bypass Restricted shell | Privilege Escalation TutorialThis article will help you to bypass restricted shell. Privilege escalation techniques helps to bypass rbash .4d ago4d ago
Published inInfoSec Write-upsBypass Restricted shell | Privilege Escalation Techniques [EJpt exam]This article helps you to bypass restricted shell basically this methods comes around Privilege Escalation and also helps in EJpt exam.5d ago5d ago
Published inInfoSec Write-upsHow to Get Root Privilege after getting foothold [ EJPT Notes]This article helps you to get root access on the machine using privilege escalation. This article helps you to prepare for Ejpt exam.Mar 21Mar 21
Published inInfoSec Write-ups$50K Bounty Just for GitHub Access Token exposureThis vulnerability gives you a thousands of dollar bounty Just finding a KeyMar 191Mar 191
Published inInfoSec Write-upsHow to Access Another’s Systems Remotely like Hacker [Ethical Hacking]This tutorial guide you how to access any computer remotely like a hacker. Get remote access of any system using this hacking technique.Mar 15Mar 15
Published inInfoSec Write-upsLinux Privilege Escalation [Part-1] | EJPT NotesLinux Privilege Escalation Techniques (full tutorial) , In which how to gain root user access after gaining foothold.Mar 11Mar 11
Anonymous access on SMB [Ejpt exam notes]How to dump passwords using anonymous access vulnerability of SMB.Mar 7Mar 7
Published inSystem Weakness🛠Account Takeover on Hackerone using Token leakage🛠By using Token leakage vulnerability , attacker can easily reset accounts password and get access over the accounts. This vulnerability…Feb 27Feb 27
Published inInfoSec Write-upsJUST CRASHED SYSTEM USING IMAGE AND GOT BOUNTY $ 500This is easy and impactful vulnerability that might be a cause of DOS attack. Crash target system and lot of things basically its working…Feb 262Feb 262