PinnedUnauthenticated Access to Remote Configuration JSON File via Exodus APII tried submitting to hackeroneSep 28, 2024Sep 28, 2024
🛠️ Introduction to SIM Card Hooking & Cloning🛠️ Introduction to SIM Card Hooking & Cloning SIM card attacks have been increasingly weaponized in recent years, often used for identity…Feb 12Feb 12
SQLMAP PAYLOADS — BLACKHAT STYLE CHEAT SHEETThis is a basic cheat sheet for beginners I would go to the following if you want actual real payloads…Jan 15Jan 15
A hackerIn the quiet hum of a flickering screen, Where the lines of code weave a digital dream, A whisper of caution, a flicker of dread, Lurks…Dec 12, 2024Dec 12, 2024
OpenSSL Zero DayThis vulnerability can be classified as a zero-day because it highlights an issue that has not been publicly disclosed or patched in a…Dec 12, 2024Dec 12, 2024
Summary: A WebSocket client encounters an abrupt termination after successfully connecting to the…Environment: WebSocket Client: Custom Python script using websocket-client library. Server: ws.blockchain.info Date/Time of Occurrence: May…Nov 27, 2024Nov 27, 2024
Advanced Guide to DNS over TLS DoT Security for WebsitesOverview of DNS over TLS (DoT) DNS over TLS (DoT) is a protocol designed to encrypt DNS queries between clients and servers, preventing…Nov 8, 2024Nov 8, 2024