File upload tricks and checklist

A compilation of tricks and checks for when a file upload is encountered in an offensive security test.
A guide to implementing gRPC services worldwide

Unravel the simplicity of gRPC with Project Crobat. Learn to streamline development with gRPC and empower your projects. Dive into our blog for insights!
Method Confusion In Go SSTIs Lead To File Read And RCE

Delve into OnSecurity’s research on Go’s server-side template injection vulnerabilities, revealing potential for file reads and RCE exploits. Read more now.
How A Love Letter Changed Computer Security Forever

Delve into the fascinating narrative of how a love letter altered the landscape of computer security perpetually. Uncover this tale of technological evolution.
Understaning Zero-Day Exploit And What Can I Do About It?

Explore the challenge of vulnerabilities exploited before fixes. Learn how to address security gaps and protect against threats in this insightful discussion.
Investigation: Why was LinkedIn targetted by phishing scams?

Explore the methods targeting LinkedIn users through phishing scams and gain insights into the everyday tactics used by cybercriminals to exploit you further.
Cybercriminals Demand $70m Ransom In ‘Colossal’ Attack

Uncover the latest threat looming over government servers. The newfound vulnerability impacts Microsoft systems, leaving government infrastructures at risk.
Here’s what you need to do when you’ve been phished

Do you suspect a phishing attempt? Explore this guide for actionable steps on what to do next. Get assistance in handling potential phishing incidents.
Threat modelling: The Tool That You’ve Nerver Heard Of

Learn proactive cyber threat prevention through threat modeling. Discover how to anticipate and mitigate security incidents before they occur with this guide.
The Tools That We Love And You Might Aswell: Clubhouse

We love using Clubhouse to helps us develop our security projects