Pinnedc0d3x27inInfoSec Write-upsThis Is How I Hacked My Neighbors ComputerNot only websites and companies get hacked, A real life storyJun 26, 202110Jun 26, 202110
Pinnedc0d3x27inInfoSec Write-upsAn HTML Injection Worth 600$ DollarsWhen not letting go, and fighting for your rights, payback..Mar 19, 20211Mar 19, 20211
Pinnedc0d3x27inInfoSec Write-upsFinding And Exploiting S3 Amazon Buckets For Bug BountiesMany websites have private S3 buckets holding secrets inside. We want them.Mar 9, 20214Mar 9, 20214
c0d3x27inInfoSec Write-upsLFI WITH PHPINFO TO RCELFI vulnerabilities when testing PHP applicationsJul 302Jul 302
c0d3x27inInfoSec Write-upsMy Hunt: Discovering Microsoft BugsNavigating the Terrain of Microsoft’s Software: Insights from a Bug HunterMay 112May 112
c0d3x27inInfoSec Write-upsHack Stories: Hacking Hackers EP:3The Cybersecurity World is Not As Big As You May ThinkApr 244Apr 244
c0d3x27inInfoSec Write-upsHack Stories: Hacking Hackers EP:2LockBit, Noname57, CyberDragon… Ah The RussiansFeb 28Feb 28
c0d3x27inInfoSec Write-upsHack Stories: Hacking Hackers EP:1When cockiness backfires and put your company at risk.Feb 122Feb 122
c0d3x27inInfoSec Write-upsWindows Login BypassHow to use a USB to Unlock your BoxNov 29, 20231Nov 29, 20231
c0d3x27inInfoSec Write-upsWindows RDP Session HijackingHow Red Team members take control over User’s RDP sessionsJul 31, 20231Jul 31, 20231