PinnedPrivilege Escalation With fail2banA quick start guide for privilege escalation with fail2banApr 15Apr 15
PinnedPublished inDevOps.devFive Effective Ways to Secure Your Docker ContainersA collection of simple but effective ways to increase the security of your Docker containersApr 14Apr 14
PinnedExploiting a Flask Server Using a Known Secret KeyHow knowing the secret key of a Flask server can be used to create a custom session cookie and bypass authenticationJan 13Jan 13
PinnedSQLMap over WebSocketsSQLMap is a powerful open-source tool that is widely used for detecting and exploiting SQL injection vulnerabilities in web applications…Mar 8, 2023Mar 8, 2023
PinnedBoosting Go Performance: Dynamic vs Static AllocationA simple test about the performance of dynamic and static allocation in Go to create a new sliceAug 7, 2024Aug 7, 2024
THM - Wordpress: CVE-2021–29447A writeup for the room Wordpress: CVE-2021–29447 on TryHackMeApr 11Apr 11