Jul 20, 2023
Introducing jsluice: A Technical Deep-Dive for JavaScript Gold (Part 2)
By Tom Hudson
Jul 20, 2023
Introducing jsluice: The Why Behind JavaScript Gold Mining (Part 1)
By Tom Hudson
Jun 30, 2023
CVE-2023-27997 Is Exploitable, and 69% of FortiGate Firewalls Are Vulnerable
By Caleb Gross
Jun 20, 2023
CVE-2023-27997 Vulnerability Scanner for FortiGate Firewalls
By Caleb Gross
Jun 13, 2023
Introducing CloudFoxable: A Gamified Cloud Hacking Sandbox
By Seth Art
May 25, 2023
Power Up Your Pen Tests: Creating Burp Suite Extensions with the New Montoya API
By Christopher Cerne
May 17, 2023
A More Complete Exploit for Fortinet CVE-2022-42475
By Carl Livitt, Jon Williams
Mar 23, 2023
What the Vuln: EDR Bypass with LoLBins
By Lindsay Von Tish
Feb 21, 2023
What the Vuln: Zimbra
By Carlos Yanez
Feb 01, 2023
Spoofy: An Email Domain Spoofing Tool
By Matt Keeley
Jan 10, 2023
Cloud Penetration: Not Your Typical Internal Testing
By Seth Art
Dec 09, 2022
160K COVID-19 Records: Vulnerability in Avicena Medical Laboratory
By Dardan Prebreza
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.