Forem

# pentest

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Next.js Middleware Broken Access Controls
Cover image for Next.js Middleware Broken Access Controls

Next.js Middleware Broken Access Controls

1
Comments
1 min read
Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Comments
2 min read
2FA Bypass via Response Manipulation

2FA Bypass via Response Manipulation

1
Comments
1 min read
How To Find Zombie Hosts With Nmap?
Cover image for How To Find Zombie Hosts With Nmap?

How To Find Zombie Hosts With Nmap?

Comments
2 min read
You do not know, what you do not know.

You do not know, what you do not know.

Comments
2 min read
What is a polyglot in Hacking

What is a polyglot in Hacking

Comments
2 min read
Explorando o Metasploit Framework: A Ferramenta Essencial para Testes de Penetração e Segurança

Explorando o Metasploit Framework: A Ferramenta Essencial para Testes de Penetração e Segurança

Comments
3 min read
Setting Up Your Flipper Zero: A Step-by-Step Guide for Beginners
Cover image for Setting Up Your Flipper Zero: A Step-by-Step Guide for Beginners

Setting Up Your Flipper Zero: A Step-by-Step Guide for Beginners

9
Comments
4 min read
10 Livros para Aprendizado Avançado de Pentest e Segurança (Hackers)
Cover image for 10 Livros para Aprendizado Avançado de Pentest e Segurança (Hackers)

10 Livros para Aprendizado Avançado de Pentest e Segurança (Hackers)

3
Comments
12 min read
How I transformed my career from software engineer to a penetration tester?

How I transformed my career from software engineer to a penetration tester?

4
Comments
2 min read
Otimizando Wordlists para Pentests
Cover image for Otimizando Wordlists para Pentests

Otimizando Wordlists para Pentests

13
Comments
7 min read
O que vem depois do Pentesting?
Cover image for O que vem depois do Pentesting?

O que vem depois do Pentesting?

14
Comments
13 min read
Cloud Pentest 101
Cover image for Cloud Pentest 101

Cloud Pentest 101

35
Comments
2 min read
Information Gathering

Information Gathering

7
Comments
2 min read
Pentesting Tools I Use Everyday
Cover image for Pentesting Tools I Use Everyday

Pentesting Tools I Use Everyday

4
Comments
6 min read
Using Node.js to Parse a JSON File Generated from WPScan
Cover image for Using Node.js to Parse a JSON File Generated from WPScan

Using Node.js to Parse a JSON File Generated from WPScan

1
Comments 2
3 min read
'; SQL_Injection ( ) ;--

'; SQL_Injection ( ) ;--

6
Comments 2
7 min read
Find your way in GraphQL applications - Paths explained

Find your way in GraphQL applications - Paths explained

13
Comments 4
1 min read
GraphDNA: Fingerprint GraphQL engines

GraphDNA: Fingerprint GraphQL engines

9
Comments
1 min read
A new tool for recon Office365 users

A new tool for recon Office365 users

5
Comments
1 min read
Como eu descobri uma falha de segurança em um sistema na minha universidade
Cover image for Como eu descobri uma falha de segurança em um sistema na minha universidade

Como eu descobri uma falha de segurança em um sistema na minha universidade

7
Comments
6 min read
How did I discover a security vulnerability in a system of my university

How did I discover a security vulnerability in a system of my university

3
Comments
6 min read
Anonymous Blob Access

Anonymous Blob Access

9
Comments
2 min read
Abusing Managed Identities

Abusing Managed Identities

9
Comments
4 min read
Escalating Privileges using a misconfigured service principal

Escalating Privileges using a misconfigured service principal

5
Comments
3 min read
loading...