Blog

Home / Blog

Buffer Overflow Basics

Buffer Overflow Basics February 03, 2023 Web Application Karan Patel Buffer overflow is a vulnerability where a program tries to store more data in a

Read More »
Exploiting MySQL Service

Exploiting MySQL Service

Exploiting MySQL Service December 31, 2022 Web Application Tarak Sakhardande What is MySQL? MySQL is a powerful, free, open-source database management system widely used in

Read More »
Insecure Deserialization in PHP

Insecure Deserialization in PHP

Insecure Deserialization in PHP August 03, 2022 Web Application Redfox Security Team In this blog (part of the “Insecure Deserialization” series), we will discuss insecure

Read More »
Intro to BEFF Framework

Intro to BEFF Framework

Intro to BEFF Framework July 01, 2022 Web Application Redfox Security Team Hey everyone, in this blog, we will be discussing about BeEF, which is

Read More »
Spring4Shell Vulnerability

Spring4Shell Vulnerability

Spring4Shell Vulnerability April 13, 2022 Web Application Redfox Security Team Synopsis A sequence of Tweets (that are now deleted) from a Chinese Twitter account was

Read More »
Hacking GraphQL (Part 3)

Hacking GraphQL (Part 3)

Hacking GraphQL (Part 3) April 09, 2022 Web Application Tarak Sakhardande In Part 2 of the Hacking GraphQL series, we discussed the GraphQL DoS attack.

Read More »