HTTP is dead... Long live HTTP?! In this post, I will continue on my last paper by showing the readers a severe HTTP request smuggling bug chain using a new gadget, as well as a few ways to exploit it.
From Akamai to F5 to NTLM... with love. In this post, I am going to show the readers how I was able to abuse Akamai so I could abuse F5 to steal internal data including authorization and session tokens from their customers.
Writing your own RDI /sRDI loader using C and ASM In this post, I am going to show the readers how to write their own RDI/sRDI loader in C, and then show how to optimize the code to make it fully position independent.
Automating C2 Infrastructure with Terraform, Nebula, Caddy and Cobalt Strike In this post, I am going to show the readers how to build a fully automated C2 infrastructure using Terraform with Nebula's end-to-end encryption backend communication layer.
From SKID to SAVAGE by abusing OST and Telegram services. In this post, I am going to show readers how easy it is for up-and-coming threat actors to completely compromise, then possibly extort large companies with very little effort by abusing openly available resources.