/ Archive by category "Vulnerabilities & Exploits"

Category Vulnerabilities & Exploits

This category combines exploit development with practical vulnerability research, guiding you through buffer overflows, memory corruption, privilege escalation, and remote code execution. Learn how to dissect real-world CVEs, write your own exploits in Python, and leverage tools like Metasploit and Exploit-DB. Whether you’re simulating attacks in a lab or preparing for red team engagements, these tutorials offer the technical foundation to exploit weaknesses across operating systems, applications, and embedded systems.

The One-Man APT – Part II: Stealthy Exfiltration with AI

In the first part of this project, I explored how artificial intelligence can be used to simulate the early stages of a stealthy APT—focusing on polyglot files, in-memory execution, and basic command-and-control behavior. Everything was generated by the AI: from…

Read MoreThe One-Man APT – Part II: Stealthy Exfiltration with AI

Machine Learning, Part 01: Getting Started with the Basics

Welcome back, my aspiring AI practitioners! Often, to build intelligent systems, we need to tackle complex problems that traditional programming simply can’t handle efficiently. It might be recognizing objects in images, understanding human speech, or predicting future trends. The key,…

Read MoreMachine Learning, Part 01: Getting Started with the Basics

Feroxbuster. Is It The Fastest Content Discovery Tool?

Welcome back, tenderfoot hackers! Web content discovery is a crucial phase in web application hacking. The ability to efficiently enumerate directories, files, and endpoints on a web server can uncover hidden attack surfaces—such as admin panels, backup files, and sensitive…

Read MoreFeroxbuster. Is It The Fastest Content Discovery Tool?

Insecure De-serialization: Millions of Applications May Be Vulnerable

Welcome back, rising cyberwarriors! Insecure deserialization represents one of the most critical security vulnerabilities in modern software applications, ranking among OWASP’s Top 10 Web Application Security Risks (part of Software and Data Integrity Failures). This vulnerability occurs when applications deserialize…

Read MoreInsecure De-serialization: Millions of Applications May Be Vulnerable

CVE-2025-53770: Critical SharePoint Zero-Day Under Active Exploitation

Welcome back, rookie hackers! CVE-2025-53770 is a critical remote code execution (RCE) vulnerability with a CVSS score of 9.8 that affects on-premises Microsoft SharePoint servers. This vulnerability has been actively exploited in the wild as a zero-day by unknown threat…

Read MoreCVE-2025-53770: Critical SharePoint Zero-Day Under Active Exploitation

Critical Remote Code Execution (RCE) in Roundcube, CVE-2025-49113: Your Email is Not Safe!

Welcome back, rookie cyberwarriors! Roundcube is one of the most widely used open-source webmail clients, integrated by default into major hosting platforms such as cPanel and Plesk. In June 2025, a critical security vulnerability — CVE-2025-49113 — was publicly disclosed.…

Read MoreCritical Remote Code Execution (RCE) in Roundcube, CVE-2025-49113: Your Email is Not Safe!

The best introduction to hacking is now AN UNBEATABLE Price

over 56 hours of videos, 10 courses, and 3 books

$149

Master OTW assembled this powerhouse bundle with everything you need to start hacking and build a career 

one purchaser wins a free 3-year Subscriber training package

don't miss out

;