Finding Initial Access on a real life Penetration Test |
|
|
|
Emotional Rollercoaster: A Unique Case Study of Bypassing Antivirus and Firewall by Abusing PostgreSQL |
|
|
|
How I was able to steal users credentials via Swagger UI DOM-XSS |
|
|
|
From Shodan Dork to Grafana đź“ŠLocal File Inclusion |
|
|
|
How i Found Unauthorized Bypass RCE |
|
|
|
Outdated PHP Version leads to RCE |
|
|
|
How I found a GoldMine but got No Gold |
|
|
|
How I got a lousyT-Shirt from the Dutch Government. |
|
|
|
For the first Bounty, it takes a few challenging months, but only a few days for the second. |
|
|
|
Unauthenticated Sensitive Information Disclosure at [REDACTED] |
|
|
|
In Cloud we “Trust”: Wrong Kubernetes implementation by Google Cloud Platform & Microsoft Azure affecting customers |
|
|
|