blog
/var/log/writtings

Security Notes

Research on security, backend development and project logs.

Categories

0/11

Filter posts by selecting one or more categories.

TommyBoy1 - Vulnhub

TommyBoy1 - Vulnhub

Detailed step-by-step exploitation of a VulnHub machine, applying OSCP-style enumeration, exploitation, and privilege escalation techniques.

9 MIN READ
#VULNHUB#VULNERABLE#VIRTUAL-MACHINE#VM#OCSP
RCE (Remote Command Execution) 4 Dummies

RCE (Remote Command Execution) 4 Dummies

A brief introduction to Remote Command Execution (RCE), along with an explanation of the potential risks it poses to applications and APIs when not properly mitigated. The goal is to understand how these vulnerabilities work and to implement effective preventative measures to secure systems against exploitation.

6 MIN READ
#VULNERABILITIES#PYTHON#RED TEAM#RCE#OWASP
AI Red Teaming Intro

AI Red Teaming Intro

An introduction to AI Red Teaming concepts, focused on delivering practical insights, valuable knowledge, and curated resources to help you learn and practice effectively. This blog highlights hands-on labs, real-world scenarios, and essential techniques to build and strengthen your skills in identifying and exploiting vulnerabilities in AI systems.

5 MIN READ
#AI#PYTHON#RED TEAM

SHOWING 3 OF 3 POSTS