search

Introduction to PHP remote code execution vulnerabilities

Release:2020-04-09 15:35:59
Introduction to PHP remote code execution vulnerabilities

Use the new features of php7 to bypass the anti-killing rules

Release:2020-03-04 10:45:20
Use the new features of php7 to bypass the anti-killing rules

Why is the traffic still being hijacked even though I use HTTPS?

Release:2020-02-22 16:03:52
Why is the traffic still being hijacked even though I use HTTPS?

FTP usage tutorial

Release:2020-02-06 10:01:52
FTP usage tutorial

Introduction to Linux local kernel privilege escalation vulnerability

Release:2020-01-16 17:22:42
Introduction to Linux local kernel privilege escalation vulnerability

PDO principle and correct use method

Release:2020-01-11 17:29:47
PDO principle and correct use method

Five browsers with the best privacy protection

Release:2020-01-07 17:05:29
Five browsers with the best privacy protection

Using syntax differences between PHP serialization and deserialization to bypass protection

Release:2020-01-02 16:53:08
Using syntax differences between PHP serialization and deserialization to bypass protection

Exploiting CSRF token verification mechanism vulnerability to authenticate victim accounts

Release:2019-12-28 18:02:07
Exploiting CSRF token verification mechanism vulnerability to authenticate victim accounts

Using Reflected XSS Vulnerability to Hijack Facebook Accounts

Release:2019-12-28 17:59:36
Using Reflected XSS Vulnerability to Hijack Facebook Accounts

JavaScript prototype chain pollution attack

Release:2019-12-27 17:41:58
JavaScript prototype chain pollution attack

Use lexical analysis to extract domain names and IPs

Release:2019-12-25 13:08:10
Use lexical analysis to extract domain names and IPs

Powerful IP rotation and brute force guessing technology

Release:2019-12-21 11:49:47
Powerful IP rotation and brute force guessing technology

Experiment on simple brute force enumeration method to bypass the 2FA verification mechanism of the target system

Release:2019-12-18 11:58:46
Experiment on simple brute force enumeration method to bypass the 2FA verification mechanism of the target system

AWS S3 bucket misconfiguration - millions of personal information exposed

Release:2019-12-16 17:56:34
AWS S3 bucket misconfiguration - millions of personal information exposed