XSS:From Browser Parsing to Exploitation
An article that delves into the famous web vulnerability called XSS.
An article that delves into the famous web vulnerability called XSS.
A writeup for the solution of the Monster Cookie Secret Recipe challenge in PicoCTF.
A writeup for the solution of the Spookifier challenge in HTB.
A writeup for the solution of the flagcommand challenge in HTB.
A writeup for the solution of the source room in THM.
This article delves into the DNS protocol what is it and how it works.
This post delves into the low level aspect of SHA-1 hash function, so instead of dealing with it as a black box function, this time we're going to know what does this function exactly do.