
godork
godork Find what they forget to hide…

godork Find what they forget to hide…

Path Traversal Path traversal is also known as directory traversal. These vulnerabilities enable an attacker to read arbitrary files on the server that is running an application. Env Varia...

Os Command Injection !

JWT Hacking Stuff Table of Content jwt Json Vs JWT jwt Parts Types Attacks JWT It stands for JSON Web Tokens (JWT). JSON is a lightweight, human-readable format for repres...

WordPress sites are frequently hacked due to automated attacks targeting common vulnerabilities, primarily exploiting outdated plugins, themes, or weak user credentials. Hackers use tools to scan f...

Windows Enum Comming soon…

AWS Enum I create a simple Quick recon check list for aws environment for Post Exploitation. Table of Content Identity and Access Management (IAM) Amazon Elastic Compute Cloud (EC2...

Active Directory Quick Enum I creating a simple Quick recon check list for Active Directory environment in Internal Network for Post Exploitation and Persistence. System & Identity Ide...

Linux Quick Enum I am creating a simple Quick recon check list for linux environment for Post Exploitation. Ready to start whoami id groups sudo -l sudo -v crontab -l cat /etc/crontab ls -la /...

Second Oder SQLi Second-Order SQL injection occurs when the application takes user input from an HTTP request and stores it for future use. This is done by placing the input into a database, b...