Skip to content

Ghostlulz

Hack the planet
  • Home
  • Blog
  • Books
    • Bug Bounty Playbook – P1
    • Bug Bounty Playbook – P2
    • Cloud Hacking Playbook
  • About Us

Blog

Flask RCE Debug Mode

February 15, 2020 ghostlulz

Slack Group Before we get started I have started a slack group dedicated to hacking. We welcome everyone from beginner…

Continue Reading →

Filed under: flask, RCE

Content Security Policy (CSP) Bypasses

February 7, 2020 ghostlulz

Slack Group Before we get started I have started a slack group dedicated to hacking. We welcome everyone from beginner…

Continue Reading →

Filed under: bypass, content security policy, CSP

Clickjacking

December 29, 2019 ghostlulz

How to abuse iframe functionalities to trick users into performing unwanted actions

Continue Reading →

Filed under: clickjacking

Cross-Origin Resource Sharing (CORS)

December 28, 2019 ghostlulz

How to read sensitive data via a SOP bypass.

Continue Reading →

Filed under: cors, Cross-Origin Resource Sharing, security header

Source Code Analysis Race Conditions

December 23, 2019 ghostlulz

How to find race conditions in source code.

Continue Reading →

Filed under: race condition, source code, source code analysis

Source Code Analysis SQL Injection

December 17, 2019 ghostlulz

Learn how to find SQL injection while doing source code analysis .

Continue Reading →

Filed under: source code, source code analysis, sql, sql injection

Source Code Analysis XSS

December 6, 2019 ghostlulz 19 Comments

Slack Group Before we get started I have started a slack group dedicated to hacking. We welcome everyone from beginner…

Continue Reading →

Filed under: source code, source code analysis, xss

Google Exposed Firebase Database

November 26, 2019 ghostlulz 4 Comments

How to hack a Google Firebase Database for easy wins

Continue Reading →

Filed under: database, firebase, misconfiguration

Exposed Log and Configuration Files

November 17, 2019 ghostlulz 2 Comments

Use exposed log and configurations files to find credentials and other sensitive information.

Continue Reading →

Filed under: configuration fiiles, exposed files, log files, sensitive information

Broken Link Hijacking

November 10, 2019 ghostlulz 118 Comments

Use Broken Link Hijacking to find stored XSS in web applications.

Continue Reading →

Filed under: broken link hijacking, stored xss, xss

Post navigation

Page 2 of 5
← Previous 1 2 3 … 5 Next →
Copyright © 2023 Ghostlulz