Lazy HackerStreamlining DLL Hijacking with Automated TestingI’ve developed a script that automates the DLL hijacking process. During my testing, I noticed that we often focus on DLLs marked as “Not…Sep 3Sep 3
Lazy HackerBinary Protection Checker & Sig Checker Automation ScriptI have developed an automation script for testing binary protection and signature issues. Previously, we had to open the terminal and enter…Mar 29Mar 29
Lazy HackerNo Validation Of LinkedIn Primary Email Address before Deletion Cause Account Take OverThe vulnerability that I am writing here happened to me. My LinkedIn account was hacked and somebody changed the primary email address with…Jul 28, 20234Jul 28, 20234
Lazy HackerSome Mitigation Against Phishing and MITMRegular phishing awareness should be done in the organization.Sep 17, 2022Sep 17, 2022
Lazy HackerRun Terminal Binaries in Burp: BurpBinaryRunner — (My 2nd Burp Extension in Jython)This tool is used to run binaries through Burp, tools like SSLscan, Nmap, FFUF, etc. The binaries that give the output on the terminal can…Aug 28, 2022Aug 28, 2022
Lazy HackerWhy the Older & Vulnerable Version in use Vulnerability should be of HIGH severityWhy the Older & Vulnerable Version in use Vulnerability should be of HIGH severityAug 27, 2022Aug 27, 2022
Lazy HackerWhat are serialization and deserialization? | What is insecure deserialization?What is serialization?Aug 3, 2022Aug 3, 2022
Lazy HackerWhat is salting in cryptography?Salting is the concept of adding random data in the plaintext data (Example: Password) and then creating the hash of that combination this…Jul 31, 2022Jul 31, 2022
Lazy HackerIs your webcam exposed on the internet and everyone enjoying your personal moments?Nowadays we start using many technology devices in our homes. Many people are installing CCTV or security cameras in their houses, private…Jul 14, 2022Jul 14, 2022