Posts
All the articles I've posted.
-
Advanced Web Hacking & Pivoting Cheatsheet
SSRF, Request Smuggling, Prototype Pollution, WAF bypass, OAuth, SAML, advanced logic flaws and internal pivoting
-
Web Exploitation Cheatsheet
SQLi, RCE, LFI/RFI, File Uploads, Deserialization, SSTI, Auth bypass and manual exploitation for HTB, CTFs and real-world pentests
-
Web Attack Surface & Enumeration Cheatsheet
Discovery, fingerprinting, content discovery, parameter fuzzing, virtual hosts and technology mapping for HTB, CTFs and real-world pentests
-
Password Attacks & Credential Hunting Cheatsheet
Bruteforce, credential harvesting, hash cracking, spraying and password reuse attacks for HTB, CTFs and real-world pentests
-
BurpSuite Repeater/Intruder Power Tips
Advanced workflows, payload tricks, bypass techniques and hidden features for HTB, CTFs and real-world web exploitation
-
OSINT Capture-The-Flag Cheatsheet
Fast techniques, tools and workflows for social, metadata, geolocation, infrastructure and digital footprint CTF challenges
-
Reverse Shells & Web Shells Cheatsheet
Quick shells for HTB/CTFs: reverse shells, bind shells, web shells, upgrades and fallback techniques