NGiNX configurations of doom

This document will serve as the log for researching various NGiNX configurations, how they can be avoided and how they can me leveraged from an offensive security standpoint – and in the mean time maybe create a couple of targets for echoCTF.RED 😆

Read More

Hacking tools for developers

The following document outlines the methodology we developed in order to utilize hacking and bugbounty tools to strengthen the security posture as well as robustness of our applications 😃

Read More