
OWASP CTF 2025
We Came. We Hacked. We Almost Conquered. 2nd Place 🥈
Read More
The Myth of Security in Open Source Software and 11 CVEs Uncovered in Masa CMS
Read Full ArticleWe Came. We Hacked. We Almost Conquered. 2nd Place 🥈
A Security Researcher’s Perspective
Advanced Evasion Techniques
Dive into the Security Accounts Manager (SAM) in Windows
How to Hack Spring Boot Actuator Endpoints
A detailed exploration of Conti ransomware’s TTPs based on leaked internal documentation
A WhatsApp Android Vulnerability I Discovered in 2018
Bypassing In-App Security