Explore >> Select a destination


You are here

danaepp.com
| | highon.coffee
12.3 parsecs away

Travel
| | LFI Explained and the techniques to leverage a shell from a local file inclusion vulnerability. How to get a shell from LFI
| | blog.securityinnovation.com
10.9 parsecs away

Travel
| | Command Injection allows attackers to inject commands into software and then execute them with the software's privileges. Here's how to test for them.
| | www.sjoerdlangkemper.nl
12.7 parsecs away

Travel
| | Using gadget chains it is possible to achieve remote code execution in web application that unserialize user input, even without having the complete source code.
| | jnsgr.uk
139.8 parsecs away

Travel
| An explanation of how to enable secure boot on NixOS, using a community project named 'Lanzaboote', and further how to automatically unlock a LUKS-encrypted disk using a TPM with systemd-cryptenroll.