Explore >> Select a destination


You are here

blog.ikuamike.io
| | www.thapatechnical.com
2.6 parsecs away

Travel
| | [AI summary] The article provides a tutorial on implementing CRUD operations (Create, Read, Update, Delete) using PHP and MySQLi, including code examples for database connection, insertion, display, deletion, and updating data.
| | highon.coffee
1.8 parsecs away

Travel
| | LFI Explained and the techniques to leverage a shell from a local file inclusion vulnerability. How to get a shell from LFI
| | blog.0x7d0.dev
2.9 parsecs away

Travel
| | Bookworm is an Insane-difficulty machine from Hack The Box. We will exploit an XSS vulnerability to gain access to a grandfathered feature accessible only to a few users. Subsequently, we'll leverage a Path Traversal vulnerability to acquire an initial password. Then, we will exploit a bug in an internal HTTP service to pivot to another user. This second user will possess privileges to a system for generating shipping labels, vulnerable to a double injection, allowing us to escalate our privileges to root.
| | www.martinloren.com
14.8 parsecs away

Travel
| [AI summary] A blog post discussing the creation of DIY oscilloscope attenuators using 3D printing techniques, including downloadable STL files and a chart.