File Upload Vulnerability Tricks and Checklist
10 min read
Method Invocation in Go's builtin template modules lead to file read and RCE.
4 min read
Hackerone x THM CTF Web Hacking Write-Up (Hacker Of The Hill)
13 min read
How a person's name can be vital in a Social Engineering operation.
5 min read
Exploiting an XSS for CSRF to SQLi (Helicopter Administrator 247CTF writeup).
6 min read