New: offensive-securityAll contenthive-129948hive-196917krhive-180932steemhive-150122zzanhive-183959hive-185836hive-144064hive-101145hive-188619hive-166405hive-184714photographyuncommonlabhive-183397hive-145157bitcoinhive-103599hive-139150steem-atlashive-180301hive-193186hive-170554TrendingNewHotLikerscristi (70)in cybersecurity • 7 years agoJIS-CTF Walkthrough - Yet Another Cybersecurity VideoIn this video I demonstrate how to get into a webserver through an unsanitized file upload functionality. First, we're dealing with a server for which the access to the administrator panel is…cristi (70)in programming • 7 years agoDisassembling Binaries with IDA - [A Reverse Engineering Tutorial]In my penetration testing training, I'm currently working on a vulnerable machine that doesn't seem to have too many ways in. There are only 2 open ports, both for web services. I was able to…cristi (70)in offensive-security • 7 years agoA Collection of Vulnerable Machines for Penetration Testing and Offensive Security - [Vulnhub]If you're into offensive security, one of the best places to safely practice your craft is Vulnhub , which is a collection of virtual machines which are vulnerable by design. What do I mean by…