Stux

Stux

Arsenal of Hacking and Offensive Security content.

CVE-2024-9324 Exploitation Chain: Web User to NT AUTHORITY SYSTEM

CVE-2024-9324 Exploitation Chain: Web User to NT AUTHORITY SYSTEM

Step by step exploitation for the Code Injection vulnerability that I found.

in
From Discovery to Reward: How to Find Zero-Day Vulnerabilities, Sell Them, and Obtain CVEs

From Discovery to Reward: How to Find Zero-Day Vulnerabilities, Sell Them, and Obtain CVEs

Today, we will explore a crucial topic in the world of offensive security: zero-day vulnerabilities.

in
My OSCP Journey

My OSCP Journey

My experience with the OSCP certification.

in
Exploiting Cross-Site Scripting Vulnerabilities with Polymorphic Payloads

Exploiting Cross-Site Scripting Vulnerabilities with Polymorphic Payloads

In this post, the use of polymorphism in JavaScript execution payloads in Cross-Site Scripting (XSS) attacks is presented.

in
Identification and Mass Exploitation of Targets

Identification and Mass Exploitation of Targets

Hello Hackers, today we are going to see one of the techniques of how cyber criminal groups and exploitation bots carry out massive identification and later massive exploitation of targets with certain vulnerabilities present.

in
From Broken Object Level Authorization(BOLA) to the Massive Financial Attack

From Broken Object Level Authorization(BOLA) to the Massive Financial Attack

Hey everyone, today we’re going to talk about how web applications can be affected by a Broken Object Level Authorization (BOLA) vulnerability, and I’m also going to give you an exploit case example.

in