Learn about SSRF bypass techniques including URL encoding, domain manipulation, IP address conversion. Discover how to exploit these vulnerabilities for web app
Learn how to create a PPSX file for phishing purposes without using macros. This tutorial covers the steps to embed malicious programs in presentations, enhanci
Learn how to gather critical system information using WMIC commands in the command line. Explore tools for identifying installed patches, running services, star
Explore various methods of port rebinding in penetration testing using bash, perl, python, php, ruby, nc, and java. Learn how to establish a reverse shell conne
Phan is a PHP static analyzer that minimizes false positives by verifying type compatibility and checking various operations. It supports features like PHPDoc a
Explore advanced techniques for executing operating system commands via MSSQL, including xp_cmdshell, SP_OACreate, and more. This guide covers various methods t
Discover and learn about the Invoke-MS16-135 PowerShell implementation targeting vulnerable operating systems. This code allows you to run applications with spe
Explore the technique of using ADS for file execution during pentesting. Learn how to upload and execute files via CobaltStrike and Meterpreter, including comma