Skip to content
0xLuk3
Menu
BLOG
ABOUT ME
CERTIFICATIONS
[CTF Challenges]
PROJECTS
CONTACT
RESOURCES
Category:
CTF
0xLuk3
>>
CTF
Read More
February 5, 2025
February 5, 2025
0xLuk3
0xLuk3
Cyberchef is a must-have security tool.
If you're seriously involved in cybersecurity or digital forensics, you've likely encountered a variety of…
0 Comments
Read More
November 7, 2024
November 7, 2024
0xLuk3
0xLuk3
SSRF with filter bypass via open redirection vulnerability
Server-side request Forgery allows an attacker to bypass network access control and make requests to…
0 Comments
Read More
October 20, 2024
October 20, 2024
0xLuk3
0xLuk3
SQL Injection
How to detect and exploit SQL Injection vulnerabilities. Structured Query Language (SQL) Injection, or SQLi,…
0 Comments
Read More
June 12, 2024
June 12, 2024
0xLuk3
0xLuk3
IDORs: What are they and how to find them
How to find and exploit IDOR vulnerabilities in a web application giving you access to…
0 Comments
Search
Archives
March 2025
February 2025
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
Meta
Log in
Tag Cloud