Server-Side Template Injection (SSTI)
SSTI occurs when user input is embedded directly into a template string that is then rendered server-side. The template engine evaluates your input as code, lea…
Writeups, research, and technical notes from a Senior Security Consultant and competitive CTF player based in Singapore.
SSTI occurs when user input is embedded directly into a template string that is then rendered server-side. The template engine evaluates your input as code, lea…
Most people use Burp Suite at about 20% of its capability. This post covers the features that actually speed up web pentesting — Match & Replace rules, macr…
XXE (XML External Entity) injection lets you read arbitrary files from the server, perform SSRF, and in some cases achieve code execution. It’s consistently und…
XSS is far more than just <script>alert(1)</script>. This guide covers every variant, context-specific injection, CSP bypass, and advanced exploitat…
A proper Android pentesting environment takes about an hour to set up correctly. This guide walks through everything: emulator vs physical device, ADB, Burp Sui…
Command injection occurs when user input is passed unsanitized to a system shell. Unlike code injection, you’re executing OS commands directly. This cheatsheet …
SQL injection remains one of the most impactful vulnerability classes in web applications. This cheatsheet covers every major technique you’ll encounter during …
Nmap is the foundation of every network engagement. This cheatsheet covers every scan type, timing option, NSE category, and evasion technique you’ll need — org…