This article details the process of cracking a screen teaching tool to bypass its registration window. It covers deobfuscation techniques using tools like De4do
This article details an interesting experience of discovering a file upload vulnerability during an OA system penetration test. It covers the process from initi
This article details a year-long penetration test on a group's system. It covers the process of enumerating usernames through password recovery pages and cracki