Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

61 total results found

Français

Le contenu HideAndSec dans la langue de Molière.

HideAndSec

A propos de nous

Nous sommes un groupe de passionnés d'informatique, de sécurité web, logiciel, IoT, analyse de bi...

SSRF Intro (Part 1 SSRF Series)

Bug Bounty | Vulnerabilities Indepth

SSRF (Server-Side Request Forgery: server-side request forgery) is a fake exploit server-initiate...

SSRF Bypass (Part 2 SSRF Series) [incomplete]

Bug Bounty | Vulnerabilities Indepth

What can we do with SSRF? SSRF to reflection XSS Try to use URL to access internal resources an...

SSRF Prevention (Part 3 SSRF Series)

Bug Bounty | Vulnerabilities Indepth

How to prevent SSRF It is easier to filter the returned information and verify the response of t...

SSRF in a CTF Context (Part 4 SSRF Series)

Bug Bounty | Vulnerabilities Indepth

Common attack surface Port scanning can be performed on the external network, the internal netwo...

CSP Intro (Part 1 CSP Series)

Bug Bounty | Vulnerabilities Indepth

CSP (Content Security Policy) is there / in-place to mitigate some attacks, such as xss, csrf. It...

CSP Bypass (Part 2 CSP Series) TODO

Bug Bounty | Vulnerabilities Indepth

CSP Prevention (Part 3 CSP Series)

Bug Bounty | Vulnerabilities Indepth

CSP is especially important for your users: they no longer need to be exposed to any unsolicited ...

CSP in a CTF Context (Part 4 CSP Series)

Bug Bounty | Vulnerabilities Indepth

Common attack surface script-src : script: only trust the current domain nameobject-src : Do not...

Members

A propos de nous

mxrch Passionné d'informatique et de sécurité depuis toujours, je m'intéresse aussi du côté de l...

Attacks

Web

Contact

A propos de nous

Pour toutes questions, veuillez nous contacter à : contact[@t]hideandsec[d0t].sh.

Brève introduction

Pwn Introduction aux Buffer Overflow

Tout d'abord qu'est ce qu'un buffer overflow? Et à quoi ça sert? Les buffer overflow sont des fa...

Passons à la pratique!

Pwn Introduction aux Buffer Overflow

Première phase de l'exploitation Nous allons desormais nous appuyer sur le programme précédement...

HideAndSec

About Us

We are a group of cybersecurity enthusiasts interested in various areas including software securi...

Members

About Us

mxrch Passionate about computing and security since always, I'm also interested in AI, blockchai...

Contact

About Us

Please contact us at : contact[at]hideandsec[d0t].sh If you have any question regarding our writ...

Zipper (Hard)

Hack The Box | Machines Linux

What you will learn: API to RCE Funky shell magic to get a stable environment Abusing SUID ...

Reverse shells

Cheatsheets

Listener Avant tout reverse shell, il faut mettre en place le listener, qui va écouter un port e...

Content Discovery / Recon

Bug Bounty | Bughunting Oneliners

Obtain subdomains and links from the target host: for h in $(cat hosts.txt); do curl -siL https:...

Attaques

Web

English

For english people

Pwn

Let's pwn the wrld

Hack The Box | Machines

Linux and Windows machine writeups

Bug Bounty | Bughunting Oneliners

Useful commands and code specifically tailored to improving your bug-bounty-hunting-skills

Bug Bounty | Vulnerabilities Indepth

In depth view of how to attack and defend against modern day attack vectors

A propos de nous

Qui sommes-nous et qui se trouve derrière le masque ?

Introduction aux Buffer Overflow

Nous allons dans cet article voir qu'est ce qu'un buffer overflow et comment exploiter notre prem...

Cheatsheets

Les antisèches pour les mauvais élèves

Red Teaming Tactics

Red teaming methodologies, tools, and techniques

About Us

Who are we and who sits behind the mask?

Hack The Box | Machines

La plateforme ultime pour h4x0rs

Windows

Hack The Box | Machines

Linux

Tout ce qui est GNU / Linux !

Web

L'internet mondial

Web

The World Wide Web

CTF

Cheatsheets

Articles with ready to use commands for pentest and CTF

Windows

Hack The Box | Machines

Linux

Hack The Box | Machines

Introduction aux Buffer Overflow

Pwn

Nous allons dans cet article voir qu'est ce qu'un buffer overflow et comment exploiter notre prem...

Linux

Hack The Box | Machines

Zipper (Hard)

Hack The Box | Machines Linux

Ce que vous allez apprendre : API vers RCE De la magie pour obtenir un shell stable Abus des...