Influence: The Psychology of Persuasion - Chapter 1 Review
8 min read
File Upload Vulnerability Tricks and Checklist
10 min read
Method Invocation in Go's builtin template modules lead to file read and RCE.
4 min read
Hackerone x THM CTF Web Hacking Write-Up (Hacker Of The Hill)
13 min read
How a person's name can be vital in a Social Engineering operation.
5 min read