2026
~7 min read
React2Shell: Modern Web Frameworks as Attack Vectors
CVE-2025-55182 — critical unauthenticated RCE in React Server Components. Prototype pollution meets unsafe server-side deserialization in the Flight protocol, with ~436K exposed Next.js instances.
React/Next.js
RCE
Proto Pollution
Read More
2026
~6 min read
CVE-2025-24893: Unauthenticated RCE in XWiki
Remote code execution via the SolrSearch macro — a single HTTP GET request achieves full system compromise through Groovy template injection. No credentials required.
Groovy Injection
SolrSearch
RCE
Read More
2026
~8 min read
Mirth Connect RCE: Healthcare Meets Insecure Defaults
Exploiting CVE-2023-43208 — critical authentication bypass in NextGen Healthcare's Mirth Connect integration engine. From version detection to reverse shell on 272K+ exposed instances.
Healthcare
Auth Bypass
Reverse Shell
Read More
February 2026
~10 min read
Sudo NSS Library Hijack: From User to Root
Deep dive into Xpl0it — a PoC exploiting sudo's trust model when handling
dynamic library loading in chroot environments. How sudo -R
+ a crafted nsswitch.conf delivers a root shell.
PrivEsc
Sudo
NSS Hijack
Read More
2026
~12 min read
Post-Exploitation Part 1: Privilege Escalation
Getting a shell is just a foothold. SUID abuse, kernel exploits (DirtyCow, PwnKit),
and sudo misconfigurations that turn a low-priv user into root.
SUID
Kernel
Sudo
Read More
2026
~12 min read
Post-Exploitation Part 2: Pivoting
Lateral movement through compromised networks — Living off the Land, SSH tunneling (local + remote port forwarding), SOCKS proxying, and persistence with autossh.
LOLBins
SSH Tunneling
SOCKS Proxy
Read More
2026
~10 min read
Detecting Firewalls Before They Detect You
Mapping the control plane during post-exploitation — understanding iptables, nftables, firewalld, and UFW. Automating Linux firewall detection with a custom script.
Firewalls
Linux
Bash
Read More
2026
~5 min read
The Death of the Underground Hacking Scene
What happened when exploits went from currency to content? The information trading economy that defined hacker culture collapsed — we gained access but lost something essential.
Hacker Culture
History
Essay
Read More
November 2025
~6 min read
GraphQL Introspection: Exposing API Architecture
Found a production GraphQL endpoint with introspection enabled, revealing the complete API schema.
How reconnaissance through introspection leads to data disclosure and exploitation vectors.
GraphQL
API Security
Recon
Read More
August 2025
~8 min read
Jenkins Exploitation: Script Console RCE
Discovering exposed Jenkins servers with unauthenticated script console access.
Command execution, AWS metadata extraction, and establishing persistence through Groovy.
RCE
Jenkins
Groovy
Read More
August 2025
~5 min read
CORS Misconfiguration & Data Exfiltration
Identifying and exploiting CORS misconfigurations for unauthorized data access.
Building proof-of-concept exploits and understanding the security implications.
Web Security
CORS
Data Leak
Read More
August 2025
~4 min read
Unauthorized Cache Purge: DoS via HTTP Methods
Exploiting accessible PURGE HTTP methods without authentication.
Clearing website cache to cause performance degradation and denial of service conditions.
Web Security
DoS
HTTP Methods
Read More