PinnedPublished inSystem WeaknessK8s Runtime Attack Scenarios IntroductionHello, I created this article to collect my articles about Container Runtime Attack scenarios that I created for K8s and similar…Jun 1, 2023Jun 1, 2023
PinnedSource Code ScanHello, I am working on how to scan source code specific to each language or framework using source code scanning tools. My work is…Aug 31, 2021Aug 31, 2021
PinnedSakaHello, I have prepared an article that will give you information about the Saka project in general.Aug 26, 2021Aug 26, 2021
Stored XSS (File Upload Filename)Hello friends, today I will show you the steps of detecting a vulnerability that I encountered in Web Application Security Tests in my…2d ago2d ago
Stored XSS (File Upload Comment)Hello friends, today I will show you the steps of detecting a vulnerability that I encountered in Web Application Security Tests in my…6d ago6d ago
Stored XSS (Comment)Hello friends, today I will show you the steps of detecting a vulnerability that I encountered in Web Application Security Tests in my…Nov 6Nov 6
PwnOS-1 WalkthroughHello, in this article I will show you step by step how to solve PwnOS -1 . The purpose of this CTF will be to become root. Click to get…Aug 25Aug 25
Kioptrix Level 4 WalkthroughHello, in this article I will show you step by step how to solve Kioptrix Level4. The purpose of this CTF will be to become root. Click to…Aug 25Aug 25
Kioptrix Level 3 WalkthroughHello, in this article I will show you step by step how to solve Kioptrix Level3. The purpose of this CTF will be to become root. Click to…Aug 4Aug 4