All posts

Playing with python PEX files [Python]

Introduction

Recently I have been coming across lots of Python EXecutables. This seems to be a popular way of distributing python programs along with their dependencies. All that is necessary is a compatible python runtime. A very quick and a bit outdated WTF is PEX?. In most cases …


Configuring bspwm for my setup [Linux]

After about few months with i3, I stumbled upon i3gaps in my quest for some space between the tiling windows. If you haven't heard or used i3 like window manager, you might prefer using it first. Soon, I started seeing awesome configurations of herbstluftwm and bspwm. Out of these two …


One of the main issues people face in web application based organizations is the channel of communication between the security team and developers. This often involves lengthy steps for reproduction of vulnerabilities. Often times these are tedious to follow let alone repeat multiple times for the pentesters. So, I was …


Teaching XSS to a machine [Hacks]

Even before we start anything, just have a glance at few interesting vectors that were dreamt by a machine learning agent which has structural knowledge of HTML. Few vectors require user interaction also. I tried to add comments about what I think is special about few of those.

<body onblur …

Every time I try a bug bounty program on HackerOne, I first check for flash files on the domains which are in scope. Flash files are always a good target as far as I am concerned. Approximately three months back, I came across VK.com bug bounty. So, when I …


Page 1 / 7 »

Categories
Tags
Author