exploit 25
- 👩💻IW Weekly #129: Google VRP Blog, CVE-2024-29847 Exploit, Hotstar Hacked, Bug Bounty Tips, OSINT Explained, and many more…
- 👩💻IW Weekly #125: AWS ALBeast Vulnerability, SSRF Bug In Microsoft’s Copilot Studio, Cache Misconfiguration Exploit, Web Caching, DEF CON 32, Game Hacking, and many more…
- Gotta cache 'em all: bending the rules of web cache exploitation
- Splitting the email atom: exploiting parsers to bypass access controls
- Fickle PDFs: exploiting browser rendering discrepancies
- 👩💻IW Weekly #117: API Hacking, Hacking Large Corporations, CrushFTP Exploit, NextJS & Cache Poisoning, Prototype Pollution, Nested Deserialization and many more…
- 👩💻IW Weekly #104: ClickHouse, Velociraptor, WAF bypass techniques, Path Traversal Vulnerabilities, io_uring Vulnerability in Ubuntu, Shockwave Attack Surface Management, .NET Remoting Exploits, Github dorks and many more…
- 👩💻IW Weekly #100🎉Server-Side Prototype Pollution, Zero-Click ATO Exploit, SSRF Bugs, GRX Interface address using TCP, GraphQL API Schemas, XSS for ATO, IDOR, Unicode Normalization and many more…
- 👩💻IW Weekly #97: XSS on Microsoft Whiteboard and Excalidraw, ChatGPT Account Takeover, reverse engineered ESP32-based air purifier, advanced HTTP header exploitation techniques, PikaBot Malware Analysis and many more…
- 👩💻IW Weekly #94: 2FA Bypass, Decoding Obfuscated JavaScript, Exploiting Password Reset Functionality, AWS S3 Bucket Takeover, Invisible Prompt Injections and many more…
- High Signal Detection and Exploitation of Ivanti's Pulse Connect Secure Auth Bypass & RCE
- 👩💻IW Weekly #92: Cloudflare Pages Vulnerabilities Analysis, CORS Cache Exploitation Automating RTFM with ChatGPT, Shrewdeye Bash, XSS to ATO, Bypassing Door Passwords and many more…
- 👩💻IW Weekly #89: Business Logic Vulnerability, DNS Poisoning, XSS Exploitation to Steal Credentials, Payment Processor Hacking, Second Order SQL Injections, Blind CSS Exfiltration, Symfony Exploits and many more…
- Finding and Exploiting Citrix NetScaler Buffer Overflow (CVE-2023-3519) (Part 3)
- Exploiting XSS in hidden inputs and meta tags
- Exploiting prototype pollution in Node without the filesystem
- Exploiting Web3's Hidden Attack Surface: Universal XSS on Netlify's Next.js Library
- Exploiting Improper Validation of Amazon Simple Notification Service SigningCertUrl
- You Have One New Appwntment: Exploiting iCalendar Properties in Enterprise Applications
- uBlock, I exfiltrate: exploiting ad blockers with CSS
- ROP and Roll: EXP-301 Offensive Security Exploit Developer (OSED) Review and Exam
- A Tale of Two Formats: Exploiting Insecure XML and ZIP File Parsers to Create a Web Shell
- Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty
- Exploiting Directory Traversal to View Customer Credit Card Information on Yahoo's Small Business Platform
- Exploiting Markdown Syntax and Telescope Persistent XSS through Markdown (CVE-2014-5144)