n00🔑Creating a pdf merger Web Application using chatgpt AIHi readers, recently I was filling up an online form and it was required to merge, upload and submit documents in pdf format. Usually, I…Jan 31, 2023Jan 31, 2023
n00🔑SSRF:SSRF- Server Side Request Forgery is a technique used to subvert the application logic from the intended functionality of fetching contents…Apr 10, 20241Apr 10, 20241
n00🔑Static Application Security Testing using “semgrep”Static Application Security Testing (SAST) is an essential part of modern software development. It helps developers identify…Jul 1, 2024Jul 1, 2024
n00🔑Wordpress SQL Injection, Making Wordprss vulnerable to SQLi (Capgemini Tech Challenge 2020)Hi, I have recently participated in a Penetration testing hackathon. This one is my proposed solution for the question given below, In…Nov 16, 2020Nov 16, 2020
n00🔑PHP serialization: Friend or Foe 🤔. Lets try to exploit!Serialization is nothing but a way of representing objects as a long string. Methodology here is similar to encoding. We are converting…Jan 31, 2021Jan 31, 2021
n00🔑Turning LFI into RCE by sending emails via SMTP and other LFI’sHi, here we will see some things which we can do with LFI. And combining this info how we can get RCE.Jul 18, 2021Jul 18, 2021
n00🔑Creating simple middleware for easy exploitation of second-order injections like SQLi, SSTI, etcSecond order injection is code injection vulnerability in which unfiltered user input is not directly being passed to the query by web…Oct 27, 2021Oct 27, 2021
n00🔑Exploiting log4jshell(CVE-2021–44228)- solar(THM) and logforge(HTB)Hi readers, here we will be looking into the exploitation of CVE-2021–44228.Dec 17, 2021Dec 17, 2021