Published inInfoSec Write-upsSilent Python Path HijackingDemonstrating how Python can be silently hijacked when permissions are set incorrectly, potentially leading to privilege escalation.2d ago2d ago
Published inInfoSec Write-upsVanilla PowerShell Reverse Shell Using ICMPIn this article I want to walk you through how I created a reverse shell using vanilla PowerShell which communicates using ICMP.Mar 21Mar 21
Published inInfoSec Write-upsBuilding A Pattern-based XSS Recon ToolLearn how to set up a customizable Python tool which you can use to scan for Cross-Site Scripting vulnerabilities using patterns searchesMar 18Mar 18
Published inInfoSec Write-upsVisualizing XSS With Unusual PayloadsAn Alert-Free Way to Demonstrate XSSMar 4Mar 4
Published inOSINT TeamUsing LSB To Hide Data In My SocksLearn how to use Python to hide data in an image using the Least Significant Bit. Follow this walkthrough to learn more about…Mar 4Mar 4
Published inInfoSec Write-upsPython Powered XSS Payload ServerDemonstrating the impact of XSS attacksFeb 26Feb 26
Published inOSINT TeamHiding Data In Response HeadersLearn how to hide data in plain sight using response headers within a mock web shop, demonstrating data concealment techniques.Jan 22Jan 22
Published inInfoSec Write-upsManual obfuscation in PowerShellWhy automate all the fun stuff?Dec 24, 2024Dec 24, 2024