Cross-Account Profile Picture Deletion via CSRF Token Bypass paid me 500$.As a security researcher passionate about uncovering vulnerabilities, I recently embarked on a journey to test the security of web…Jul 11Jul 11
Automating Information Reporting with PowerShell: Enhancing System Monitoring.Introduction:Jun 22, 2023Jun 22, 2023
Concealing Digital Footprints: An Introduction to TimestompInteracting with file systems often leaves traces, just like walking in the snow. Digital forensics is the art of analyzing these…May 27, 2023May 27, 2023
Privilege Escalation: Unlocking Higher-Level AccessWhen it comes to client-side exploits, it’s not uncommon to find yourself operating with limited user rights within the compromised system…May 22, 2023May 22, 2023
Client Side Exploits in MetasploitIn today’s rapidly evolving security landscape, social engineering has emerged as a dominant attack vector. Despite technological…May 22, 2023May 22, 2023
Unveiling the Dark World of Malware: Understanding Concepts, Types, and Analysis.Introduction:Apr 15, 2023Apr 15, 2023