React2Shell - CVE-2025-55182
2025-12-31
Analyzing and understanding the react2shell (CVE-2025-55182) vulnerability.
2328 words
|
12 minutes
Dissecting the Gremlin Infostealer
2025-10-28
Analysis of the C# based Gremlin Infostealer
1109 words
|
6 minutes
Taking a look at the Leprechaun Loader
2025-10-20
Diving into leprechaun loader, performing static and dynamic analysis of the malware.
1068 words
|
5 minutes
Attack Mapping with Bloodhound
2025-07-08
Learn about bloodhound, ingestors, its installation and their usage and mapping attack paths with bloodhound.
1968 words
|
10 minutes
Abusing Active Directory Certificate Services
2025-06-21
Learn about the significance of active directory certificates in pentesting, abusing ADCS and ESC1 attack.
931 words
|
5 minutes
Bypassing JWT authentication through jku header injection
2024-05-26
Bypassing JWT security through JKU header injection to manipulate authentication
1070 words
|
5 minutes
Writing your first assembly program
2022-01-03
Learn about bare basics of assembly language and how to write a basic program in assembly
726 words
|
4 minutes