
Featured
-
SQLi Hands-On: Injecting Chaos
A practical deep dive into SQL Injection in DVWA — from simple payloads to reading and writing files, fuzzing with ffuf, and scripting attacks in Burp Suite. -
Breaking Htb Underpass
Cracked the UnderPass HTB box by skipping dead ends, abusing SNMP leaks, and turning mosh-server into a root shell with zero password — here is how. -
What I Do After the User Flag — My Beginner’s Priv Esc Flow
Getting user.txt is just the beginning. Here’s how I hunt for privilege escalation paths on Linux boxes — what I check, how I think, and why it still stumps me sometimes. -
Introduction to Shells — essential knowledge
Understand what shells really are, how they evolved, why they matter, and how different types like reverse shells and webshells work.