Jailbreaking the iPhone 3GS from Scratch, Part 1: initial access
Jailbreaking the iPhone 3GS from Scratch, Part 1: initial access Note: I am always learning. This series is a study project, not a definitive guide, …
Read more →Jailbreaking the iPhone 3GS from Scratch, Part 1: initial access Note: I am always learning. This series is a study project, not a definitive guide, …
Read more →Second Order SQL Injection in phpIPAM 1.7.4 (CVE-2026-4189) Back in 2022, I found a SQL injection in phpIPAM 1.4.4 (CVE-2022-23046) via the BGP …
Read more →In this challenge, you’ll be working with a fictitious app called Run Time, which tracks your steps while running. Your objective is to bypass the …
Read more →Introduction The Captain No Hooks lab provides an in-depth exploration of iOS RASP (Runtime Application Self-Protection) defenses. This comprehensive …
Read more →Introduction In this challenge, you will explore the vulnerabilities in an internally used application named Time Trap, focusing on Command Injection. …
Read more →Introduction The Gotham Times lab provides an in-depth exploration of iOS webviews and their security implications. This comprehensive guide focuses …
Read more →Flipcoin Wallet CTF - SQL Injection Challenge In this CTF challenge, I’ll explore a SQL Injection vulnerability ( Client Side) in the Flipcoin …
Read more →In my previous post Bypassing MTLS in Flutter, I discussed how MTLS is generaly implemented in the Flutter framework. Depending on how an application …
Read more →Exploit Path Traversal and XSS in NASA Subdomains In this post, I’ll share my journey of discovering two vulnerabilities on NASA subdomains (Just 4 …
Read more →Overview In this blog post, we’ll tackle: bypassing mTLS with Flutter due to common mistake ( ¯\(ツ)/¯ ) from developers. Before we continue.. …
Read more →Overview In this blog post, we’ll tackle a compelling challenge: decrypting WhatsApp messages. However, before we dive into the solution, …
Read more →In this blog post, we will explore a specific template injection vulnerability discovered in a CTF (Capture The Flag) challenge from kitctf. We will …
Read more →TL;DR This write up is about a SQL injection which I found 4 days after another researcher reported it :/, however, because of the fact that I haven’t …
Read more →This write up explains how i solved the challenge proposed by CakeCTF2022. The challenge was to get the flag in a binary made with the Nim …
Read more →Hi everyone, in this blog i’m going to explain a little bit of my journey to solve a iOS challenge proposed by @as0ler. The Challenge can be …
Read more →