• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Manuals

  1. dEEpEst

    Android Arch Linux on Android (chroot)

    Requirements Termux Root access You need to flash Busybox with Magisk Setting Arch chroot Open your terminal app and enter root shell by executing the command su Navigate to folder where you want to download and install Arch cd /data/local/tmp wget...
  2. dEEpEst

    Pentest Find XSS Vulnerabilities in Just 2 Minutes

    Find XSS Vulnerabilities in Just 2 Minutes The process is very simple and efficient. The first step is to copy the target website URL. Now that we know the target, the next step will be to execute a very simple, yet powerful one-liner command that streamlines the testing process. Here’s how it...
  3. dEEpEst

    Reverse Engineering Reverse Engineering and Dismantling Kekz Headphones

    Close to a year ago, I stumbled upon the Kekz Headphones, which seemed like an interesting approach on the whole digital audio device space. They claimed to work without any internet connection and all of the content already on the headphones itself. They are On-Ear Headphones, which work by...
  4. dEEpEst

    Ruby Class Pollution in Ruby: A Deep Dive into Exploiting Recursive Merges

    Introduction In this post, we are going to explore a rarely discussed class of vulnerabilities in Ruby, known as class pollution. This concept is inspired by the idea of prototype pollution in JavaScript, where recursive merges are exploited to poison the prototype of objects, leading to...
Back
Top