Home
Menu
🏠 Home
👤 About
📝 Articles
😈 Exploits
🔐 CVEs
#️⃣ Tags
🧩 LeakIX Plugins
📰 Mentions
|
LIGHT
DARK
Education
2025
Helping Friends Learn Cybersecurity: Lessons from Teaching Beginners
23 May 2025
2023
IDOR Vulnerability: Explanation, Exploitation, and Prevention
7 Apr 2023
Using Python Sockets for Offensive Security
7 Apr 2023
Upload Vulnerabilities: Understanding, Exploiting, and Fixing
5 Apr 2023
Privilege Escalation on Unix Systems via Crontab
4 Apr 2023
What is a Command Injection?
4 Apr 2023
Configuring an Apache Server with SSL/TLS Hardening
3 Apr 2023