You are here |
danaepp.com | ||
| | | |
highon.coffee
|
|
| | | | LFI Explained and the techniques to leverage a shell from a local file inclusion vulnerability. How to get a shell from LFI | |
| | | |
blog.securityinnovation.com
|
|
| | | | Command Injection allows attackers to inject commands into software and then execute them with the software's privileges. Here's how to test for them. | |
| | | |
www.sjoerdlangkemper.nl
|
|
| | | | Using gadget chains it is possible to achieve remote code execution in web application that unserialize user input, even without having the complete source code. | |
| | | |
jnsgr.uk
|
|
| | An explanation of how to enable secure boot on NixOS, using a community project named 'Lanzaboote', and further how to automatically unlock a LUKS-encrypted disk using a TPM with systemd-cryptenroll. |