
CVE-2025-49132 Pterodactyl Panel - Unauthenticated Remote Code Execution (RCE)
PoC exploit for CVE-2025-49132 (GHSA-24wv-6c99-f843) – Unauthenticated Remote Code Execution in Pterodactyl Panel ≤ 1.11.10

PoC exploit for CVE-2025-49132 (GHSA-24wv-6c99-f843) – Unauthenticated Remote Code Execution in Pterodactyl Panel ≤ 1.11.10

A privilege escalation technique that abuses Python’s unchecked-hash bytecode caching mechanism to execute attacker-controlled .pyc files with elevated privileges when a writable __pycache__ direct...

A walkthrough of the HackTheBox 'Browsed' machine. This write-up covers initial access, privilege escalation, and post-exploitation techniques.

A walkthrough of the HackTheBox 'MonitorsFour' machine. This write-up covers initial access, privilege escalation, and post-exploitation techniques.

This note covers Cross-Site Scripting (XSS) and its practical exploitation through PortSwigger labs. It explains the theory behind reflected, stored, and DOM-based XSS, details how browsers interpr...

This note covers Cross-Origin Resource Sharing (CORS) and practical misconfigurations from PortSwigger labs. It explains how CORS policies work (simple vs. preflight requests, Access-Control-Allow-...

Notes from PortSwigger Academy’s CSRF labs covering different bypass techniques — from basic CSRF with no defenses to advanced SameSite Lax/Strict bypasses using method override, token manipulation...

This note covers Server-Side Request Forgery (SSRF) with seven hands-on PortSwigger labs (basic local/internal SSRF, blind/OOB SSRF, blacklist/whitelist bypasses, open-redirect chaining, and an exp...

This note covers Broken Authentication in web applications — PortSwigger labs that demonstrate unprotected admin endpoints, predictable/unpredictable admin URLs, role tampering via request paramete...

A step‑by‑step, detailed guide for writing professional CPTS exam reports using Sysreptor. Covers structuring findings, evidence collection, reproducible walkthroughs, templated sections (exec summ...