Discover the value of subdomain fuzzing with a real-world example that led to a $35k bounty. Learn about Auth Bypass, RCE and SQLI techniques in this detailed c
Learn how to upgrade a time-based SQL injection to Remote Code Execution (RCE) by exploiting xp_cmdshell and bypassing WAF. Discover the steps and techniques us
Explore the process of tracing and countering an attack in this project, including identifying the attacker's tools, understanding the scan targets, and analyzi
This article documents the vulnerability hunting process of a certain first-class university's platform. Key findings include an arbitrary file read exploit and