Hey guys! In this video, I’m gonna show you how I find secrets hiding in web apps like API keys, tokens, and passwords devs accidentally leave behind. I’ll be using Gitleaks, a solid tool that helps dig this stuff up …
Did you know Google once paid nearly $150k to a security researcher for discovering a single SSRF vulnerability? That vulnerability was Server-Side Request Forgery (SSRF), a potentially devastating flaw that can allow attackers to manipulate web servers. If you’re interested …
Hey guys! In this video, we will discuss how to generate a payload and a listener via Empire, and trick users into clicking a .pdf shortcut that has that backdoor. This is How Hackers Take Over Your Device! Empire is a …
A step-by-step guide teaching you how to discover and exploit IDOR vulnerabilities + xp_cmdshell + local buffer overflow to hack a RaaS (Ransomware-as-a-Service) platform and gain full remote control over their servers. Check out the video below: Hacking the Hackers …
In this video, we will be covering Binary Exploitation: Stack Overflows. The goal here in the Stack Overflow is to demonstrate my code—this is a sample code that I wrote, and I’ll upload this code to my GitHub and point …
Summary Of rConfig rConfig is an open-source network device configuration management utility for network engineers to take frequent configuration snapshots of their network devices. About The Exploit I was able two detect two remote command execution vulnerabilities in two …