LATEST POSTS

Blog2022-07-29T17:39:53-04:00

Our team researches and documents bleeding-edge security concepts and hacking techniques.
This blog explores these topics and more to keep you informed.

Windows Subsystems for Linux – What is it and How to Proxy Web Traffic to BurpSuite

By |March 15, 2024|Blog|

As you walk the path to becoming an ethical hacker, you begin realize that one of the greatest skills in this profession is your ability to learn and adapt to new tools and technologies. Recently, ...

Exploiting Cross-Site Scripting (XSS) Vulnerabilities to Steal Cookies

By |January 24, 2023|Blog|

What are Cookies? While browsing the internet, chances are that you’ve came across pop-ups that ask if you want to allow cookies. Instead of questioning what cookies are, the average user accepts the cookies and ...

Go to Top