This article details an emergency response conducted through a post-backend approach. It covers the process of identifying and analyzing web backdoors, logging,
This article details a penetration test conducted on a vendor's demo site. The author discovered several vulnerabilities including SQL injection and successfull
This article details an interesting traceback process during a cybersecurity exercise. It reveals the discovery and analysis of a phishing attack through GitHub
Discover and exploit file upload vulnerabilities with Fuxploider, an open-source tool for automated detection and exploitation. Learn how to install and use thi