
Wordpress Hacking Stuff
WordPress sites are frequently hacked due to automated attacks targeting common vulnerabilities, primarily exploiting outdated plugins, themes, or weak user credentials. Hackers use tools to scan f...

WordPress sites are frequently hacked due to automated attacks targeting common vulnerabilities, primarily exploiting outdated plugins, themes, or weak user credentials. Hackers use tools to scan f...

Windows Enum Comming soon…

AWS Enum Comming soon…

AD Enum Coming soon…

Linux Quick Enum I am creating a simple Quick recon check list for linux environment for Post Exploitation. System & Identity id # User’s identity information hostna...

Second Oder SQLi Second-Order SQL injection occurs when the application takes user input from an HTTP request and stores it for future use. This is done by placing the input into a database, b...

EBS Amazon Elastic Block Store (EBS) is a persistent, high-performance block storage service designed for use with Amazon EC2 instances. It functions like a virtual hard drive, providing durab...

🪿 s3 s3 stands for Simple Storage Service (s3). Thinks of it’s like an FTP. ( FTP == s3 ) Usage:- Hosting a Static website , Backup’s , Logs and etc… Buckets:- They are Top Leve...

⛈️ IAM IAM Stands for Identity and Access Management (IAM).It is a framework used in cloud computing to control and Manage. Who can access: This includes users, applications, and services that r...

Nopac Obtain credentials for an unprivileged domain-attached user. Add a computer to their account using Machine Account Quota—let’s name it machine_account$. Rename the added computer to match the...