IDORs: What are they and how to find them
How to find and exploit IDOR vulnerabilities in web applications
OpManager: CSRF & XS-Leak Chained for Information Disclosure ⌘ Read more
5 Methods I Use To Discover APIs ⌘ Read more
Analyzing a Phishing Email Header ⌘ Read more
Nuclei: The Ultimate Guide to Fast and Customizable Vulnerability Scanning ⌘ Read more
Establishing Remote SSH Connections from Windows to Kali Linux
Setting up SSH keys to a Remote Kali Linux VM
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/establishing-remote-ssh-connections-from-wind … ⌘ Read more
Real World GitLab Account Take Over ⌘ Read more
Busting CSRF: The Hidden Dangers of JSON Exploited ⌘ Read more
Discovering a $5000 RCE via Dependency Confusion Vulnerability ⌘ Read more
“The Evolution of Phishing Attacks: From Deceptive Emails to Sophisticated Cyber Threats” ⌘ Read more
“Strengthening Your Cybersecurity Posture: Comprehensive Guide to Conducting Vulnerability… ⌘ Read more
Airplane: THM WALKTHROUGH ⌘ Read more
Honeypots 103: Decoding Your SANS DShield Honeypot’s Data ⌘ Read more
Ransomware Evolution and Defense Strategies ⌘ Read more
HOW I HACKED NASA? ⌘ Read more
Exploiting a Visible Error-based SQL Injection to get Admin Password: Lab11 ⌘ Read more
Lab10 : Uncovering Admin Password Through Conditional Error Handling in SQL Injection ⌘ Read more
I Asked Three CISOs How To Succeed In Cybersecurity. This Is What I Learnt …
Their Advice Changed My Career Trajectory
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/i-asked-three-cisos-ho … ⌘ Read more
Case Study: Foodmandu Breach by 1337mickey ⌘ Read more
Case Study: Vianet Data Breach ⌘ Read more