cat /blog/*
Cybersecurity articles, tutorials, and research
Exploiting a Banking Playground - Vulnerable Bank Application
A walkthrough of exploiting a purposely vulnerable banking application, replicating common issues encountered during real-world security assessments including SQL injection, mass assignment, JWT forgery, and business logic flaws.
Plug & Pwn Chronicles - LAN Turtle
A hands-on guide to deploying the Hak5 LAN Turtle for covert network access during Red Team engagements, covering setup, reverse SSH tunneling, and pivoting with ProxyChains.
root@blog:~# No matching posts found.