cat /blog/*

Cybersecurity articles, tutorials, and research

2025-09-23 application-securityappsecdevsecopsred-teaming

Exploiting a Banking Playground - Vulnerable Bank Application

A walkthrough of exploiting a purposely vulnerable banking application, replicating common issues encountered during real-world security assessments including SQL injection, mass assignment, JWT forgery, and business logic flaws.

2025-05-08 hak5lan-turtleinitial-accessred-teaming

Plug & Pwn Chronicles - LAN Turtle

A hands-on guide to deploying the Hak5 LAN Turtle for covert network access during Red Team engagements, covering setup, reverse SSH tunneling, and pivoting with ProxyChains.

root@blog:~# No matching posts found.

ESC