Generate a user name list for brute force from first and last name
How to generate user name lists suitable for brute force attacks from first name and last name using custom John the Ripper rules
Redis SSRF exploits without new line
How to exploit redis via SSRF without using binary-safe version of redis protocol
Download DVIA solutions
Download the complete list of Damn Vulnerable iOS Application (DVIA) solutions
Groovy reverse and bind shells
How to create reverse and cmd shells using groovy console or execute a system command.
Java socket web shell from Controller or Servlet
Turn Java Servlet or Spring MVC controller into interactive web shell