Homepage
Open in app
Sign in
Get started
System Weakness
Security Experts Searching For Vulnerabilities in The Vast Universe
ARCHIVE
Write for us
ABOUT US
CyberSecurity
InfoSec
Pentesting
CTF
Follow us on Twitter
Follow
Following
Opacity — THM
Opacity — THM
We’re back with another box from TryHackme. This one is a boot2root where we need to abuse a file upload function to get a shell. From…
gh0stsh3ll5619
May 9
Understanding CSRF Attacks: Safeguarding Your Web Applications
Understanding CSRF Attacks: Safeguarding Your Web Applications
In today’s interconnected digital landscape, web applications play a pivotal role in facilitating seamless user interactions. However, with…
Igor Venturelli
May 9
Learning the basics of authentication with Go and htmx
Learning the basics of authentication with Go and htmx
Have you ever wondered about how authentication works but the technicalities of cryptography seemed too complex? Words like hashing…
Guille_maru
May 9
Exploring JWT Exploitation Methods
Exploring JWT Exploitation Methods
Discover various JWT exploitation methods, from privilege escalation to account takeover, and arm yourself with defense tactics and…
Mike Blinkman
May 8
How to Streamline Zombie Account Management?
How to Streamline Zombie Account Management?
Introduction
Jay
May 8
Mittre Att&ck‘s User Manual 👀
Mittre Att&ck‘s User Manual 👀
What’s inside Mittre Att&ck? Let’s take a look.
Hatice Zehra Kamanlı
Apr 24
MERN Stack Development Guide
MERN Stack Development Guide
1. Introduction to MERN Stack
Ashish Singh
Jan 15
Deploying a 3-tier architecture with Kubernetes for a MERN (MongoDB, Express.js,
Deploying a 3-tier architecture with Kubernetes for a MERN (MongoDB, Express.js,
I’ll provide simplified examples for each step using YAML files. Please note that these examples are meant for educational purposes and may…
Ashish Singh
Jan 12
Follow us on Twitter
Follow us on Twitter!
Trending
Criminal IP Search Engine Usage — Best OSINT Tool
Criminal IP Search Engine Usage — Best OSINT Tool
Criminal IP — The Search Engine For Hackers
ZeusCybersec
Nov 15, 2023
Using a telegram bot to notify SSH connections
Using a telegram bot to notify SSH connections
Today we´ll using a telegram bot to notify ssh connections on our linux servers.
Alvaro Martinez Muñoz ✅
Feb 19
Basic Pentesting 01 Walkthrough
Basic Pentesting 01 Walkthrough
Know, Learn, and Practice
t3h7e36
Mar 14, 2023
About System Weakness
Latest Stories
Archive
About Medium
Terms
Privacy
Teams