1 |
- CryptoZombies Lesson 1
- HTB Machine- Networked
- Blog - 2FA security Bypasses
|
2 |
- CryptoZombies Lesson 2
- HTB Machine- Optimum
- HTB Challenge- Chase
- Blog - Postmessage Vulnerabilities
|
3 |
- CryptoZombies Lesson 3(ch.1-5)
- HTB Machine- Backdoor
- Blog- Going beyond the surface-Vuln that pays well
|
4 |
- CryptoZombies Lesson 3(ch. 5-10)
- HTB Machine- Legacy
- Blog- WAF Bypass via Origin IP
|
5 |
- CryptoZombies Lesson 3(ch. 10-14)
- HTB Machine- Secret
- Blog- How to PoC your Bug Leads
|
6 |
- CryptoZombies Lesson 4(ch. 1-7)
- HTB Challenge- Gunship
- Blog- QRCDR ZeroDay Path Traversal Vulnerability
|
7 |
- CryptoZombies Lesson 4(ch. 7-13)
- HTB Machine- CAP
- Blog- Instagram 2FA Bypass
|
8 |
- CryptoZombies Lesson 5(ch. 1-7)
- Blog- Bypassing SSRF Protection to leak AWS Metadata
|
9 |
- CryptoZombies Lesson 5(ch. 8-15)
- Blog- Blog- SVG Based Stored-XSS
|
10 |
- CryptoZombies Lesson 6(ch. 1-5)
- HTB Machine- RouterSpace
- Blog- Mastering Ethereum Ch.1
|
11 |
- CryptoZombies Lesson 6(ch. 6-11)
- HTB Machine- Return
- Blog- How to Find Vulnerability in Smart Contracts — Unexpected Ether
|
12 |
- CryptoZombies ChainLink Path(ch.1-6)
- Blog- Hacking with sqlmap
|
13 |
- CryptoZombies ChainLink Path(ch.6-12)
- Blog- A Case Study on CVE 2021-22204 Exiftool RCE
|
14 |
- CryptoZombies Lesson 10(ch.1-11)
- Blog- Optimism Infinite Money Duplication Bugfix
|
15 |
|
16 |
- CryptoZombies Lesson 11(ch.1-7)
- HTB Machine- Meta
- Blog: Parameter Pollution - Zero Day
|
17 |
- CryptoZombies Lesson 11(ch.8-15)
- HTB Machine- Shibboleth
- Blog: BlockChain Oracle
|
18 |
- Ethernaut CTF(Lvl. 0-1)
- HTB Machine- Nunchucks
- Blog: Sql Injection at Spotify
|
19 |
- Ethernaut CTF(Lvl. 2)
- HTB Machine- Unicode
- Blog: Polygon Double-Spend Bugfix Review
|
20 |
- Ethernaut CTF(Lvl. 3)
- HTB Machine- BountyHunter
- Blog: ERC20 Smart Contract Breakdown
|
21 |
- Ethernaut CTF(Lvl. 4)
- HTB Machine- Validation
- Blog: How to get started Hacking Wordpress Plugins
|
22 |
- Ethernaut CTF(Lvl. 5,6)
- HTB Machine- Timing
- Blog: RocketPool and Lido Frontrunning Bug Fix Postmortem
|
23 |
- Ethernaut CTF(Lvl. 7)
- Blog: IDOR leads to 2fa Bypass
|
24 |
- Ethernaut CTF(Lvl. 8)
- HTB Machine- GoodGames
- Blog: Reconnaissance is the key to success !
|
25 |
- Ethernaut CTF(Lvl. 9)
- Blog: Redacted Cartel Custom Approval Logic Bugfix Review
|
26 |
- Blog: Some critical vulnerabilities found with passive analysis
|
27 |
- Blog: Google Dork for instant bounties
|
28 |
- Blog: Bypassing File Upload Restriction with Magic Numbers
|
29 |
|
30 |
- Ethernaut CTF(Lvl. 10)
- Blog: Hashing the Favicon.ico
|
31 |
- Ethernaut CTF(Lvl. 11)
- HTB Machine- Ransom
- Blog: Everything About Path Traversal Vulnerability
|
32 |
- Blog: Spring4Shell: Spring Remote Code Execution Vulnerability
|
33 |
- HTB Machine- Sniper
- Blog: A brief overview of JWT and its exploits
|
34 |
- Blog: Design Flaw - A Tale of Permanent DOS
|
35 |
- Book: Hacking APIs(Ch. 1)
- Blog:API authentication bypass on National Informatics Centre
|
36 |
- Book: Hacking APIs(Ch. 2)
- Blog:HTTP Request Smuggling on business.apple.com
|