Generate a user name list for brute force from first and last name

How to generate user name lists suitable for brute force attacks from first name and last name using custom John the Ripper rules

Redis SSRF exploits without new line

How to exploit redis via SSRF without using binary-safe version of redis protocol

Download DVIA solutions

Download the complete list of Damn Vulnerable iOS Application (DVIA) solutions

Groovy reverse and bind shells

How to create reverse and cmd shells using groovy console or execute a system command.

Java socket web shell from Controller or Servlet

Turn Java Servlet or Spring MVC controller into interactive web shell