Open in app

Sign In

Write

Sign In

Security Lit Limited
Security Lit Limited

1.3K Followers

Home

About

Published in

InfoSec Write-ups

·Pinned

Enhancing Bug Bounty Workflow with Advanced Google Dorks

Bug bounty hunting has become an essential part of cybersecurity, allowing skilled individuals to identify vulnerabilities in web applications and networks. Google Dorks, which are specialized search queries, can significantly aid in this process by helping security researchers find sensitive information and potential attack vectors more effectively. …

Google Dork

3 min read

Enhancing Bug Bounty Workflow with Advanced Google Dorks
Enhancing Bug Bounty Workflow with Advanced Google Dorks
Google Dork

3 min read


Pinned

Firewall Evasion Techniques using Nmap

Introduction There are several opportunities to test network penetration. …

Technology

7 min read

Firewall Evasion Techniques using Nmap
Firewall Evasion Techniques using Nmap
Technology

7 min read


Sep 2

Exploit Analysis: Request-Baskets v1.2.1 Server-side Request Forgery (SSRF)

In the world of cybersecurity, vulnerabilities and exploits are constantly evolving. One such vulnerability is the Server-side Request Forgery (SSRF), which allows attackers to manipulate a vulnerable server into making potentially malicious requests on their behalf. In this blog post, we will dive into an example exploit that leverages an…

Bug Bounty

4 min read

Exploit Analysis: Request-Baskets v1.2.1 Server-side Request Forgery (SSRF)
Exploit Analysis: Request-Baskets v1.2.1 Server-side Request Forgery (SSRF)
Bug Bounty

4 min read


Published in

InfoSec Write-ups

·Sep 2

Leveraging Search Queries for Bug Bounty: A Guide to Finding Vulnerabilities

In the realm of cybersecurity, bug bounty programs have become a popular way for companies to identify vulnerabilities in their systems, applications, and networks. Ethical hackers and cybersecurity researchers use specialized search queries to discover these vulnerabilities. …

Bug Bounty

3 min read

Leveraging Search Queries for Bug Bounty: A Guide to Finding Vulnerabilities
Leveraging Search Queries for Bug Bounty: A Guide to Finding Vulnerabilities
Bug Bounty

3 min read


Aug 31

Exploiting Maltrail v0.53 — Unauthenticated Remote Code Execution (RCE)

In this blog post, we will delve into an exploit for Maltrail v0.53, which allows for unauthenticated remote code execution (RCE). This vulnerability has been assigned the identifier CVE-2023–27163. Overview: Exploit Title: Maltrail v0.53 — Unauthenticated Remote Code Execution (RCE) Exploit Author: Iyaad Luqman K (init_6) Application: Maltrail v0.53 Tested on…

Bug Bounty

2 min read

Exploiting Maltrail v0.53 — Unauthenticated Remote Code Execution (RCE)
Exploiting Maltrail v0.53 — Unauthenticated Remote Code Execution (RCE)
Bug Bounty

2 min read


Published in

CodeX

·Aug 29

How to Exploit a WordPress Plugin Vulnerability: A Case Study of TheCartPress

WordPress plugins are essential for adding functionality and features to your website, but they can also introduce security risks if they are not updated or maintained properly. …

Bug Bounty

3 min read

How to Exploit a WordPress Plugin Vulnerability: A Case Study of TheCartPress
How to Exploit a WordPress Plugin Vulnerability: A Case Study of TheCartPress
Bug Bounty

3 min read


Published in

Dev Genius

·Aug 29

Exploring the User Registration & Login and User Management System v3.0 SQL Injection Exploit

In the ever-evolving landscape of cybersecurity, it’s essential to stay updated on the latest vulnerabilities and exploits that can compromise the security of web applications. In this blog post, we will delve into a recently discovered SQL injection exploit in the User Registration & Login and User Management System v3.0…

Bug Bounty

3 min read

Exploring the User Registration & Login and User Management System v3.0 SQL Injection Exploit
Exploring the User Registration & Login and User Management System v3.0 SQL Injection Exploit
Bug Bounty

3 min read


Published in

Dev Genius

·Aug 24

Understanding Different Types of VPNs: An In-Depth Guide

Virtual Private Networks, commonly known as VPNs, are essential tools in the modern digital landscape. They serve multiple purposes, such as enhancing online security, bypassing geo-restrictions, and enabling secure connections between different locations. …

VPN

3 min read

Understanding Different Types of VPNs: An In-Depth Guide
Understanding Different Types of VPNs: An In-Depth Guide
VPN

3 min read


Published in

CodeX

·Aug 23

Beginner’s Guide to Basic Linux Commands

Linux is a powerful and versatile operating system. For those new to Linux, understanding its commands is essential for effective navigation and interaction. Here’s a beginner-friendly guide to some of the most essential Linux commands: 1. ls: Lists the contents of a directory. 2. cd: Changes the current working directory. 3. pwd…

Linux

2 min read

Beginner’s Guide to Basic Linux Commands
Beginner’s Guide to Basic Linux Commands
Linux

2 min read


Published in

Artificial Intelligence in Plain English

·Aug 10

The Ultimate Guide to the 15 Most Powerful AI Tools You Can’t Miss in 2023

1. Decktopus Decktopus is an AI-driven presentation maker that simplifies the process of creating professional presentations. By simply entering the title, users can generate complete presentations with visually appealing designs. It offers various templates and customization options, making it suitable for business meetings, educational purposes, and more. 2. Chatmasters Chatmasters is a platform that…

Artificial Intelligence

3 min read

The Ultimate Guide to the 15 Most Powerful AI Tools You Can’t Miss in 2023
The Ultimate Guide to the 15 Most Powerful AI Tools You Can’t Miss in 2023
Artificial Intelligence

3 min read

Security Lit Limited

Security Lit Limited

1.3K Followers

https://capturethebug.xyz/signup/

Following
  • Benjamin A.

    Benjamin A.

  • Jerry Keszka

    Jerry Keszka

  • eL Njas!™

    eL Njas!™

  • Igor S. Bederov

    Igor S. Bederov

  • David Merian

    David Merian

See all (96)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams