Threat Hunting series I
Detect a c2 by it’s user agent variations. Part I. Searching anomalies There are many ways to detect c2, some
Detect a c2 by it’s user agent variations. Part I. Searching anomalies There are many ways to detect c2, some
How to build an exploit through chatGPT AI. Think of a future where exploits are not sold directly, but rather
Continue readingTesting & building an exploit inside chatGPT
Exploiting error-based SQL injections via xPath functions. All began by adding a single quote, the most common SQL injection testing
Exploiting stored XSS via a YARA rule. This was a vulnerability that allowed from a YARA rule, inject stored XSS