Skip to content

Ghostlulz

Hack the planet
  • Home
  • Books
    • Bug Bounty Playbook – P1
    • Bug Bounty Playbook – P2
    • Cloud Hacking Playbook
  • Blog
  • About Us

Blog

Google Cloud Storage

October 1, 2019 ghostlulz 4 Comments

Open S3 buckets can be used to find sensitive data. Dont forgot about google cloud storage though.

Continue Reading →

Filed under: gcd, google cloud storage, s3, s3 buckets

Exposed Kubernetes API

September 30, 2019 ghostlulz

RCE exposed kubernetes API

Continue Reading →

Filed under: exposed api, kubernetes, RCE

Exposed Docker API

September 29, 2019 ghostlulz

RCE exposed docker API

Continue Reading →

Filed under: docker, exposed api, misconfiguration, RCE

Elastic Search

September 26, 2019 ghostlulz

Hacking elastic search databases

Continue Reading →

Filed under: database, elastic search

XML External Entity(XXE)

July 14, 2019 ghostlulz 8 Comments

OWASP top 10 – How to hack sites vulnerable to Xml External Entity attack.

Continue Reading →

API Hacking GraphQL

ghostlulz 1 Comment

Companies always want to use bleeding edge technology. With new technology comes new vulnerabilities.

Continue Reading →

Linkedin OSINT

ghostlulz

Open source intelligence gather is an important skill set to have. Learn to how discover employees of an organization.

Continue Reading →

Wayback Sql Injection Scanner

ghostlulz

The wayback machine archives the entire internet. Lets leverage it to find vulnerabilities on engagements.

Continue Reading →

Malware-Basic Windows Key logger

ghostlulz

Slack Group Before we get started I have started a slack group dedicated to hacking. We welcome everyone from beginner…

Continue Reading →

Github OSINT

ghostlulz

Slack Group Before we get started I have started a slack group dedicated to hacking. We welcome everyone from beginner…

Continue Reading →

Post navigation

Page 3 of 5
← Previous 1 2 3 4 5 Next →
Copyright © 2023 Ghostlulz — Velux WordPress theme by GoDaddy