Server side prototype pollution, how to detect and exploit? Server-side prototype pollution is a type of vulnerability that affects JavaScript applications running on servers. This vulnerability can be exploited by attackers to inject malicious code into an ap...
Reflective DLL Injection Reflective DLL Injection is a technique that is used by attackers to inject malicious code into a running process. This technique involves the injection of a DLL (Dynamic Link Library) into a process ...
MITRE ATTACK framework In today's world, cybersecurity is more important than ever before. Cyber attacks are becoming increasingly common, and organizations of all sizes and types are at risk. To help organizations better u...
Execute shellcode from a remote-hosted bin file using Winhttp In recent years, cybercriminals have been employing increasingly sophisticated techniques to breach the security of computer systems. One such technique is the use of shellcode to execute malicious co...
ESXi Ransomware - A case study of Royal Ransomware Ransomware is a type of malware that infects computer systems and holds the victim's data hostage until a ransom is paid. In recent years, ransomware attacks have become increasingly sophisticated, wi...
Textual Backdoor Attacks with Iterative Trigger Injection Textual backdoor attacks with iterative trigger injection are a type of cyber attack that involves the injection of malicious code into a system via text input. This technique is often used by hackers...
Malicious/fake ChatGPT client for Windows As a popular language model trained by OpenAI, ChatGPT is widely used for various purposes, such as language learning, customer support, and conversational agents. However, scammers have found a way t...