AWS S3 Bucket Hacking 101: From Enumeration to ExploitationApr 20A response icon2Apr 20A response icon2
Intercepting HTTP Traffic for Thick-Client Penetration TestingHello folks, I’m Sahil Shah, A Security Researcher passionate about Web, Mobile, and Thick client penetration testing.Feb 20A response icon1Feb 20A response icon1
CyberDefenders - PoisonedCredentials Blue Team LabHi, I’m Sahil Shah, In this walkthrough, I’ll be covering the PoisonedCredentials Lab, a challenge designed to test your incident response…Sep 19, 2024Sep 19, 2024
Unlocking the Full Potential of Amass [Part-2]This is the second article in the series about Amass Configuration.May 27, 2024A response icon3May 27, 2024A response icon3
Unlocking the Full Potential of Amass [Part-1]A Comprehensive Guide for Proper Configuration of Amass 4.2.0May 26, 2024A response icon2May 26, 2024A response icon2