You are here |
johnjhacking.com | ||
| | | |
www.evil.blog
|
|
| | | | ||
| | | |
taeluralexis.com
|
|
| | | | In this writeup, we'll exploit a Linux machine on Hack The Box with CVE-2023-46604, leveraging Java deserialization for remote code execution. | |
| | | |
www.sjoerdlangkemper.nl
|
|
| | | | This article describes how cross site request forgery works, how sites defend against it and how to bypass these defenses. | |
| | | |
www.trickster.dev
|
|
| | Code level discussion of web scraping, gray hat automation, growth hacking and bounty hunting |