TECHNICAL A Brief Introduction To XSS An introduction to cross-site scripting (XSS), including the basics, the methodology, the dangers and mitigations against XSS attacks.
TECHNICAL THM Kenobi Write Up Learn to exploit and take over a vulnerable Linux based machine with the 'Kenobi' room on TryhackMe.
CYBERSEC Autonomous Vehicle Cybersecurity Self driving cars are one of the most heavily anticipated innovations of the 21st century, but the potential cybersecurity risks cannot be ignored.
INFOSEC Secjuice Squeeze Volume 36 Welcome to the Secjuice Squeeze, a curated selection of interesting infosec articles and news that you may have missed. Now with upcoming events!
TECHNICAL TryHackMe WriteUp: Linux Challenges This write-up goes through finding flags on a Linux Machine using different commands, services, and tools found in Linux Operating System.
INFOSEC Risk Management Framework (RMF) Can Help You Develop A Secure System An overview of the Risk Management Framework (RMF) and its components.
CYBERSEC AWS CDK vs Serverless Framework Let's compare Serverless Framework and AWS CDK for framework ease of use, extensibility, and security.
TECHNICAL cors/sop/origin Cross origin requests, let's talk about cors, sop and origin and how these security measures can lead to vulnerabilities in your applications.
CYBERSEC Spyse Geek Out In this article I am going to geek out over Spyse, a new cybersecurity search engine I have started using.
TECHNICAL XSS: Arithmetic Operators & Optional Chaining To Bypass Filters & Sanitization How to use JavaScript Arithmetic Operators and Optional Chaining to bypass input validation, sanitization and HTML Entity Encoding.
INFOSEC Secjuice Squeeze Volume 35 Welcome to the Secjuice Squeeze, a curated selection of interesting infosec articles and news that you may have missed. Now with upcoming events!
INFOSEC Deep Learning & Cybersecurity: Part 3 of 5 - Data Gathering Part 3 of our Cyber Deep Learning series where we talk about the most crucial part of any machine learning project: Data Gathering.
TECHNICAL HackTheBox "Find the Secret Flag" Reversing Challenge Welcome to my technical write up of the new HackTheBox reversing tutorial 'Fund The Secret Flag'.
TECHNICAL Exploiting With Eternal Blue Learn how to exploit operating system-level vulnerabilities and gain root on the target machine with External Blue.
TECHNICAL Hacker 101 CTF: Photo Gallery A technical writeup of the hacker101 ctf (photo gallery). It containts the answers, so do not read if you are working on it.
INFOSEC Secjuice Squeeze Volume 34 Welcome to the Secjuice Squeeze, a curated selection of interesting infosec articles and news that you may have missed. Now with upcoming events!
TECHNICAL TryHackMe WriteUp - Simple CTF If you are a beginner who wants to learn about CTF's, this TryHackMe room is perfect for you!
TECHNICAL Security as Code: Writing security requirements in Gherkin An easy DevSecOps methodology to inject security requirements inside an application's repository.
TECHNICAL TryHackMe Walkthrough - A Common Linux Privilege Escalation This Beginner-friendly Walkthrough is based on TryHackMe Platform Room “Common Linux Privilege Escalation”
INFOSEC Secjuice Squeeze Volume 33 Welcome to the Secjuice Squeeze, a curated selection of interesting infosec articles and news that you may have missed. Now with upcoming events!
TECHNICAL WU02 TryHackMe- Basic Pentesting A writeup of the Basic Pentesting Room on the TryHackMe Platform.
TECHNICAL Running Kali Linux On Windows Without A Hypervisor Using WSL2 How to set up Kali Linux on Windows 10 without a Hypervisor.
INFOSEC Secjuice Squeeze Volume 32 Welcome to the Secjuice Squeeze, a curated selection of interesting infosec articles and news that you may have missed. Now with upcoming events!