2025
-
From Shodan to SQLi: Hacking an Exposed Company Dashboard
-
Shellshock: The Bash Bug That Shook the Internet 🐚
-
NoSQL Injection: Exploitation Techniques and Attack Scenarios 💣
-
Business Logic: Broken. Wallet: Hacked. OTP: Bypassed.
-
Subdomain Takeover: When Your Own Domain Becomes Your Enemy 🕵️♂️
-
Mastering Nmap: The Ultimate Guide to Port Scanning
-
XSS Meets IDOR: A Double Vulnerability Story on a Learning Platform 🔥
-
Why IDORs Are Everywhere — And How to Find Them — Part I
-
How We Discovered a Stored HTML Injection in a Chatbot System 🕷️
-
SSRF: When Your Server Becomes a Nosy Hacker — Part 1