
Security Code Review Basics in Python
Understanding how this functions works in depth Manual security code reviews in Python are essential for identifying business logic flaws and complex trust boundaries that automated tools frequent...

Understanding how this functions works in depth Manual security code reviews in Python are essential for identifying business logic flaws and complex trust boundaries that automated tools frequent...

Room: Biblioteca Difficulty: Medium | Points: 60 Description This medium-difficulty box involves basic enumeration, blind SQL injection, password reuse exploitation, and Python library hijacking...

Room: Watcher Difficulty: Easy | Points: 40 Description This room covers Local File Inclusion (LFI), FTP upload for Remote Code Execution (RCE), and privilege escalation through misconfigured su...

Room: Vulnnet Difficulty: Easy | Points: 40 Description This is an easy-difficulty box featuring basic enumeration, Local File Inclusion (LFI), and an interesting privilege escalation vector thr...

Room: Injectics Difficulty: Medium | Points: 50 Description This room focuses on advanced SQL injection techniques (including second-order SQLi) and Server-Side Template Injection (SSTI) in Twig...

This short tutorial covers how to install NVIDIA drivers and CUDA toolkit to run Hashcat with NVIDIA GPU acceleration. Install Hashcat Upgrade your system: sudo apt update && sudo apt up...

In this tutorial I want to show you how secure access to services running inside a kubernetes cluster, this is useful for Dev teams specially when they require to test certain endpoints or access s...