React2Shell — CVE-2025–55182: Practical Exploitation of the Vulnerability
Practical Exploitation of React2Shell (CVE-2025-55182)
Read article →These are my new blogs apart from Medium blogs. For my previous Medium blogs about Privilege Escalation Techniques and more, Please visit here →
Practical Exploitation of React2Shell (CVE-2025-55182)
Read article →Technical breakdown of React2Shell (CVE-2025-55182)
Read article →Finding Persistence and Data Exfiltration Challenge
Read article →Emulating adversary techniques and automating D&R with LimaCharlie & Tines
Read article →Launching a weekly DFIR series exploring real-world incident response scenarios and investigations.
Read article →One resource, ten flags - my take on the AWS Fortress experience on Hack The Box
Read article →A completely new guy in defesive side passing in a month...
Read article →Basic understanding of Sigma rules and it's importance
Read article →A secure complete CI/CD pipeline for SAST and image testing
Read article →fairly easy exam if you follow just one resource...
Read article →