<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://0xmrsecurity.github.io//</id><title>0xmr</title><subtitle>Blog of my journey in security</subtitle> <updated>2026-04-16T03:59:41+05:30</updated> <author> <name>0xmr</name> <uri>https://0xmrsecurity.github.io//</uri> </author><link rel="self" type="application/atom+xml" href="https://0xmrsecurity.github.io//feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://0xmrsecurity.github.io//"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 0xmr </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>godork</title><link href="https://0xmrsecurity.github.io//posts/godork/" rel="alternate" type="text/html" title="godork " /><published>2026-04-03T21:30:00+05:30</published> <updated>2026-04-10T00:02:22+05:30</updated> <id>https://0xmrsecurity.github.io//posts/godork/</id> <content type="text/html" src="https://0xmrsecurity.github.io//posts/godork/" /> <author> <name>0xmr</name> </author> <summary>godork Find what they forget to hide…</summary> </entry> <entry><title>Path Traversal</title><link href="https://0xmrsecurity.github.io//posts/path-t/" rel="alternate" type="text/html" title="Path Traversal" /><published>2026-04-03T21:30:00+05:30</published> <updated>2026-04-03T21:30:00+05:30</updated> <id>https://0xmrsecurity.github.io//posts/path-t/</id> <content type="text/html" src="https://0xmrsecurity.github.io//posts/path-t/" /> <author> <name>0xmr</name> </author> <category term="Web Exploitation" /> <summary>Path Traversal Path traversal is also known as directory traversal. These vulnerabilities enable an attacker to read arbitrary files on the server that is running an application. Env Variables. Running program details. Application code and Data. Credentials for back-end systems. Sensitive operating system files. Reading arbitrary files via path traversal Most Common way ( F...</summary> </entry> <entry><title>OS Command Injection</title><link href="https://0xmrsecurity.github.io//posts/os-command/" rel="alternate" type="text/html" title="OS Command Injection" /><published>2026-04-03T21:30:00+05:30</published> <updated>2026-04-03T21:30:00+05:30</updated> <id>https://0xmrsecurity.github.io//posts/os-command/</id> <content type="text/html" src="https://0xmrsecurity.github.io//posts/os-command/" /> <author> <name>0xmr</name> </author> <category term="Web Exploitation" /> <summary>Os Command Injection !</summary> </entry> <entry><title>JWT Stuff</title><link href="https://0xmrsecurity.github.io//posts/jwt/" rel="alternate" type="text/html" title="JWT Stuff" /><published>2026-03-24T21:30:00+05:30</published> <updated>2026-03-27T05:24:05+05:30</updated> <id>https://0xmrsecurity.github.io//posts/jwt/</id> <content type="text/html" src="https://0xmrsecurity.github.io//posts/jwt/" /> <author> <name>0xmr</name> </author> <category term="Web Exploitation" /> <summary>JWT Hacking Stuff Table of Content jwt Json Vs JWT jwt Parts Types Attacks JWT It stands for JSON Web Tokens (JWT). JSON is a lightweight, human-readable format for representing structured data and is widely used to exchange data between client and server. JSON sends data as plain text, making it easy to read and parse. Unlike plain JSON, JWT encodes data using...</summary> </entry> <entry><title>Wordpress Hacking Stuff</title><link href="https://0xmrsecurity.github.io//posts/wordpress/" rel="alternate" type="text/html" title="Wordpress Hacking Stuff" /><published>2026-02-25T21:30:00+05:30</published> <updated>2026-03-07T13:42:22+05:30</updated> <id>https://0xmrsecurity.github.io//posts/wordpress/</id> <content type="text/html" src="https://0xmrsecurity.github.io//posts/wordpress/" /> <author> <name>0xmr</name> </author> <category term="Web Exploitation" /> <summary>WordPress sites are frequently hacked due to automated attacks targeting common vulnerabilities, primarily exploiting outdated plugins, themes, or weak user credentials. Hackers use tools to scan for known flaws across millions of sites, often focusing on unpatched plugins and themes, which are the leading cause of compromises. A single vulnerable plugin can allow attackers to gain full control...</summary> </entry> </feed>
