Uncategorized Pretty fly for a URI: a deep-dive into exploitation of custom URI Schemes 3rd Sep 2022 — 0 Comments
Uncategorized Vuln writeup: LFD->RCE chain via HTTP Parameter Pollution, Hash length extension attack, abuse of server-sided input normalization, and selinux bypass. 3rd Sep 2022 — 0 Comments
Uncategorized Protected: [PART 6] XSS Exploitation Series – Blind / out-of-band XSS scenarios 18th Jun 2022 — Enter your password to view comments.
Uncategorized Protected: [PART 5] XSS Exploitation Series – Advanced DOM XSS testing: Sources & Sinks 18th Jun 2022 — Enter your password to view comments.
Uncategorized Protected: [PART 4] XSS Exploitation Series – Obfuscated/Stealth-based methods of testing for XSS 18th Jun 2022 — Enter your password to view comments.
Uncategorized Protected: [PART 3] XSS Exploitation Series – Building weaponized/advanced payloads 18th Jun 2022 — Enter your password to view comments.
Uncategorized Protected: [PART 2] XSS Exploitation Series – Filter Evasion 18th Jun 2022 — Enter your password to view comments.