Forem

# pentesting

Offensive security techniques and methodologies for penetration testing.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs
Cover image for ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs

ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs

Comments
6 min read
Reveal Hidden Files in Google Storage - Pwnedlabs (Cloud pentesting)

Reveal Hidden Files in Google Storage - Pwnedlabs (Cloud pentesting)

1
Comments
2 min read
CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis
Cover image for CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis

CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis

Comments
5 min read
Cybersecurity Lab: SMB Guest Access, Hashcat Benchmarking, and Rsync Exploitation
Cover image for Cybersecurity Lab: SMB Guest Access, Hashcat Benchmarking, and Rsync Exploitation

Cybersecurity Lab: SMB Guest Access, Hashcat Benchmarking, and Rsync Exploitation

Comments
2 min read
Shields Up Defense Tech: Red Team Attack Surface Expansion
Cover image for Shields Up Defense Tech: Red Team Attack Surface Expansion

Shields Up Defense Tech: Red Team Attack Surface Expansion

Comments
5 min read
PwnedLabs - Exploit SSRF with Gopher for GCP Initial Access (Cloud Pentesting)

PwnedLabs - Exploit SSRF with Gopher for GCP Initial Access (Cloud Pentesting)

1
Comments
2 min read
Understanding APIs Beyond the Textbook: A Bug Hunter’s Perspective
Cover image for Understanding APIs Beyond the Textbook: A Bug Hunter’s Perspective

Understanding APIs Beyond the Textbook: A Bug Hunter’s Perspective

Comments
2 min read
We Built POOM: A Pocket-Sized Multitool for Wi-Fi 5 GHz, BLE, Zigbee & NFC
Cover image for We Built POOM: A Pocket-Sized Multitool for Wi-Fi 5 GHz, BLE, Zigbee & NFC

We Built POOM: A Pocket-Sized Multitool for Wi-Fi 5 GHz, BLE, Zigbee & NFC

Comments
1 min read
How to pass the PNPT (2026)

How to pass the PNPT (2026)

Comments 1
13 min read
Path Traversal: A Potential Gateway to System Compromise
Cover image for Path Traversal: A Potential Gateway to System Compromise

Path Traversal: A Potential Gateway to System Compromise

1
Comments
3 min read
Hacking Ético

Hacking Ético

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.