Secjuice
  • Technical
  • OSINT
  • Unusual Journeys
  • HoF
  • Write With Us
  • Hire A Writer
  • About Us
  • Rankings

TECHNICAL

A selection of articles that are more technical in nature, written by members of the Secjuice writers collective. Join us in supporting and sharing their work!

TECHNICAL

Attack Defence: Basic Windows Exploitation #2

Part two of my series discussing Basic Windows Exploitation with Metasploit.

  • Gurkirat Singh
    Gurkirat Singh
2 min read
TECHNICAL

Attack Defence: Basic Windows Exploitation #1

A closer look at the Attack Defence Basic Windows Exploitation Framework.

  • Gurkirat Singh
    Gurkirat Singh
2 min read
TECHNICAL

HTB Omni Walkthrough

A technical walkthrough of the HackTheBox Omni challenge.

  • Andy74
    Andy74
18 min read
TECHNICAL

How to Use APIs (explained from scratch)

Learn how to use APIs with Python with no prior knowledge of either.

  • Search-ish
    Search-ish
12 min read
TECHNICAL

HTB Unbalanced Walkthrough

A technical walk through of the HackTheBox Unbalanced box.

  • Andy74
    Andy74
28 min read
INFOSEC

Make WordPress Pingback Great Again

DoS Amplification and CDN/Load Balancer/WAF bypass. This article aims to show you how a number of ways you can collect WordPress pingback.

  • theMiddle
    theMiddle
8 min read
TECHNICAL

HTB OpenKeys Walkthrough

A technical walkthrough of the HackTheBox OpenKeys CTF.

  • Andy74
    Andy74
9 min read
TECHNICAL

HTB SneakyMailer Walkthrough

A technical CTF walk through of the HackTheBox SneakyMailer machine.

  • Andy74
    Andy74
30 min read
TECHNICAL

HTB Buff Walkthrough

A technical walkthrough of the HackTheBox Buff machine.

  • Andy74
    Andy74
18 min read
TECHNICAL

BugPoC XSS Challenge Writeup

Bypassing Content-Security-Policy and escaping an iframe sandbox.

  • theMiddle
    theMiddle
7 min read
TECHNICAL

HTB Tabby Walkthrough

A technical writeup of the HackTheBox.eu 'Tabby' box.

  • Andy74
    Andy74
22 min read
TECHNICAL

HTB Fuse Walkthrough

A technical writeup of the Fuze challenge from HackTheBox.eu

  • Andy74
    Andy74
23 min read
TECHNICAL

Phone numbers investigation, the open source way

Learn the open source way to investigate international phone numbers.

  • BTF117
    BTF117
11 min read
TECHNICAL

Write-up-THM-TMUX

Learn how to use tmux to manage multiple terminals.

  • Muhammad Luqman
    Muhammad Luqman
5 min read
TECHNICAL

TryHackMe Writeup: ToolsRus

A writeup of the TryHackMe ToolRus box teaching how to use common tools to get a foothold in a webserver.

  • Muhammad Luqman
    Muhammad Luqman
7 min read
TECHNICAL

HTB Blunder Walkthrough

Welcome to another great HackTheBox writeup, this time Andy From Italy is tackling the Blunder box.

  • Andy74
    Andy74
17 min read
TECHNICAL

TryHackMe Writeup-Vulnversity

Learn how to bypass upload restrictions on a web server and gaining root access with this TryHackMe technical walkthrough.

  • Muhammad Luqman
    Muhammad Luqman
7 min read
TECHNICAL

HTB Cache Walkthrough

Welcome to another of my world famous HackTheBox walkthroughs, this time I am tackling the HTB Cache box, so lets jump right in!

  • Andy74
    Andy74
21 min read
TECHNICAL

HTB Blackfield Walkthrough

Welcome back to another HackTheBox machine pentesting session, this time we will tackle the Blackfield box.

  • Andy74
    Andy74
30 min read
TECHNICAL

WriteUp-TryHackMe-ICE

Learn how to exploit a vulnerable media server and gain root access.

  • Muhammad Luqman
    Muhammad Luqman
7 min read
TECHNICAL

HTB Admirer Walkthrough

A technical walk through of the 'Admirer' box on HackTheBox.

  • Andy74
    Andy74
19 min read
TECHNICAL

Vulnhub Kioptrix #5

Exploitation of a vulnerable Free BSD OS machine, and rooting it by escalating privileges.

  • Muhammad Luqman
    Muhammad Luqman
6 min read
TECHNICAL

THM-Writeup-BOLT

Learn to exploit a vulnerable CMS (Content Management System) using Remote Code Execution.

  • Muhammad Luqman
    Muhammad Luqman
4 min read
INFOSEC

Advanced boolean-based SQLi filter bypass techniques

Learn how to bypass filters and Application Firewall rules using MySQL String Functions, Regex Functions, Conditional Select and Set Variables to exploit a blind (boolean-based) SQL Injection vulnerability.

  • theMiddle
    theMiddle
4 min read
TECHNICAL

HTB Magic Walkthrough

A technical walk through of the 'Magic' box on HackTheBox.

  • Andy74
    Andy74
10 min read
Secjuice © 2021
Linkedin Facebook Twitter Remote Browser Isolation