The Hidden Layers of Versioning: Understanding Backports in Web ApplicationsAs web application pentesters, we often rely on version information disclosed by applications to identify vulnerabilities. However, what if…Sep 17Sep 17
Filtering Bot Traffic In DnschefWhen using dnschef, a highly configurable DNS proxy for penetration testers and malware analysts, you might encounter a situation where…Sep 6Sep 6
Change your User Agent in web pentests/bug bounties: Don’t Be a Plain Jane!As an application security engineer, I’ve encountered countless scenarios where changing the User Agent of a web request can make a world…Apr 21, 2023Apr 21, 2023
Mutual TLS — mTLSTransport Layer Security (TLS) is widely used to secure communication between clients and servers. While standard TLS provides server…Apr 13, 2023Apr 13, 2023
Road to OSCP-IIZamanin otesinde kalan bu yaziyida belki birilerine faydasi olur diye yayinliyorum. Sinava 1.5 sene once girdim ve basariyla gectim. Umarim…Apr 13, 2023Apr 13, 2023
Expose your local environment to the public with ngrokDo you like to try out new things in your VM?Apr 13, 2023Apr 13, 2023
Automating boring tasks with Python in F5Are you tired of manually performing the same tedious tasks on your F5 servers every day?Jan 2, 2023Jan 2, 2023
I am firing up honeypot w/ Docker for educational purposes!A honeypot is a computer security mechanism designed to detect, deflect or in some way counteract attempts to use an information system…May 6, 2021May 6, 2021
Windows 10 with KaliDo you use Kali? Do you use it with VMWare or Virtual Box? Do you know that you can use Kali without using any programs above? If not you…May 5, 2021May 5, 2021