Influence: The Psychology of Persuasion - Chapter 1 Review
File Upload Vulnerability Tricks and Checklist
Method Invocation in Go's builtin template modules lead to file read and RCE.
Hackerone x THM CTF Web Hacking Write-Up (Hacker Of The Hill)
How a person's name can be vital in a Social Engineering operation.