Skip to main content

August 2025

6 posts from this period

Back to 2025
🧠Educationalintermediate· 6 min read

Writeup: Bypassing Broken Access Controls in a Legacy Web App

Technical writeup of identifying and exploiting broken access control vulnerabilities in a legacy web application during a penetration test.

access controlweb securitypenetration testingOWASP
Read →
🧠Educationaladvanced· 6 min read

Whitepaper: AI and Offensive Security – Practical Use Cases

Exploring how AI and LLMs are being used in offensive security operations, from reconnaissance to payload development.

AIoffensive securityautomationLLM+1
Read →
🧠Educationalintermediate· 6 min read

How to Use Burp Suite Like a Bug Bounty Hunter

Master Burp Suite with techniques used by professional bug bounty hunters: from basic interception to advanced automation.

Burp Suiteweb securitybug bountytools
Read →
🧠Educationalintermediate· 7 min read

How to Build a Custom Wordlist with CeWL & Crunch

Create targeted wordlists for password attacks and content discovery using CeWL, Crunch, and other techniques.

wordlistspassword crackingCeWLCrunch+1
Read →
🧠Educationaladvanced· 7 min read

Walkthrough: Creating an Exploit in Python

Learn exploit development fundamentals by creating a simple buffer overflow exploit in Python, step by step.

exploit developmentPythonbuffer overflowsecurity research
Read →
🧠Educationaladvanced· 6 min read

DNS Rebinding Explained with Real Demos

Understanding DNS rebinding attacks: how they work, why they're dangerous, and how to demonstrate them in a lab environment.

DNSweb securitySSRFattack techniques
Read →
96
Total Posts
2
Years Active
10
Active Months
12h
Reading Time