Exploiting network traffic capture, PostgreSQL command execution, and container misconfigurations to achieve a complete container escape and access the host filesystem.
Exploiting Server-Side Request Forgery (SSRF) through Spring Boot Actuator to access AWS services, bypass data perimeter controls, and extract protected files using presigned URLs.
Exploring how websites can identify visitors through browser characteristics, device information, and behavioral patterns. A deep dive into privacy implications.