NGiNX configurations of doom

This document will serve as the log for researching various NGiNX configurations, how they can be avoided and how they can me leveraged from an offensive security standpoint – and in the mean time maybe create a couple of targets for echoCTF.RED 😆

Read More

Hacking tools for developers

The following document outlines the methodology we developed in order to utilize hacking and bugbounty tools to strengthen the security posture as well as robustness of our applications 😃

Read More

Privilege Escalation checklist

The following document is a checklist of linux local privilege escalation opportunities. Depending on the circumstances of each of the vulnerabilities the escalation might be horizontal or vertical (dont ask).

Read More