Explore Our Blog & Articles
Discover Our Research and Open Information Approach
Exploiting pfsense Remote Code Execution – CVE-2022-31814
by Danish
August 9, 2024
Greetings everyone, In this write-up, we will be exploring the interesting exploitation that has been done against the pfsense CVE-2022-31814....
Understanding JWT: Basics and Security Risks
by Danish
March 14, 2024
Introduction to JWT (JSON Web Token): JWT, or JSON Web Token, is a fundamental...
The Art of Intrusion: File Upload Bypass & WAF XSS Evasion in AWS S3 Demystified
by Danish
March 12, 2024
Summary: Greetings, today we will be sharing an XSS WAF bypass vulnerability that was...
Guardians of the Digital Realm: Unveiling the Importance of a Credible Cyber Security Team
by Danish
November 28, 2023
Welcome to the dynamic landscape of the digital era, where the importance of robust...
Unmasking an RFI to LFI Escalation
by Danish
November 24, 2023
Introduction: Greetings, we are going to share a recent security assessment that was performed...
Sneaky Attacks: Critical Account Deletion Vulnerability
by Danish
November 24, 2023
Introduction: In the dynamic landscape of cybersecurity, unearthing vulnerabilities is crucial to fortifying digital...
Unveiling Improper Access Control: A Journey into Admin Dashboards
by Danish
November 24, 2023
In the ever-evolving landscape of cybersecurity, uncovering vulnerabilities is crucial to maintaining the integrity...