Popular
-
Cyber Weapons
[TryHackMe] Brute-force attacks and escalating privileges using ssh2john.py in Hydra! Basic Pentesting Writeup
This time, we will study the basics of penetration tests using TryHackMe's Basic Pentesting. Please note that the explanation is a spoiler for "TryHackMe-Basic Pentesting: https://tryhackme.com/room/basicpentestingjt". Preparation First, target... -
App Generation
[Beginners OK] Easily create free, cool web pages using AI! ? What is the popular Readdy?
"The time has come for AI to create websites" -- such words are no longer special. Among them, I found Readdy, an AI service that automatically creates cool web pages by simply entering the prompt (natural language). -
Vercel
[2025 Edition] Next.js Hosting: Vercel Free Plan vs Paid Plan Thorough Comparison | Summary of Features, Limitations and Fees
Vercel is widely used as a hosting platform for Next.js apps. While it's easy to get started with the free plan (Hobby), the paid plan (Pro) has features that are essential for large-scale development. In this article, we will introduce the [2025 edition] to the full version of Vercel's free plans vs paid plans... -
Cyber Weapons
[TryHackMe] Improvement of privileges using SUID/SGID executable files! Linux PrivEsc Writeup Part 7
This time, we will try "Elevation of privileges using SUID/SGID executables (excluding known exploits)." The target machine uses the Room below of TryHackMe. "TryHackMe-Linux PrivEsc: https://tryhackme.com/room/linuxprivesc" This article is about Par... -
Other
For beginners: Practice with Spring Boot and MyBatis! SQL Injection Risks and Prevention
Security measures are unavoidable when developing web applications. Among them, "SQL injection" is known as a serious threat to databases. In this article, we will explain in an easy-to-understand manner how SQL injection works, and we will explain what it actually is... -
Cyber Weapons
[TryHackMe] I used SSH2John to extract the hash from the private key and hacked the password with John the Ripper! Overpass Writeup
This time, we will use SSH2John to extract the hash from the private key using TryHackMe's Overpass, and then identify the password using John the Ripper. Overpass is even escalated to privileges, so I hope you can do it until the end! "TryHackMe-Overpass: https://t... -
App Generation
[AI Development Tool] Vibe Coding with Base44! Full-stack development can also be completed with AI | How to get started & pricing plans explained
For those who want to create a web app but can't write code, Base44 is a service that could be a very viable option. Recently, a style of "vibe coding," in which AI is instructed to generate apps, has been gaining attention. After trying out a few services... -
Cyber Weapons
[TryHackMe] Improvement of privilege using GTFOBins! Linux PrivEsc Writeup Part 3
This time, we will try escalating privileges using "GTFOBins." The target machine uses the Room below of TryHackMe. "TryHackMe-Linux PrivEsc: https://tryhackme.com/room/linuxprivesc" This article is part 3. TryHackMe for Linux PrivEsc... -
Cyber Weapons
[TryHackMe] Privilege escalation using the environment variables LD_PRELOAD and LD_LIBRARY_PATH! Linux PrivEsc Writeup Part 4
This time, we will try escalating privileges using the LINUX environment variables "LD_PRELOAD" and "LD_LIBRARY_PATH". The target machine uses the Room below of TryHackMe. "TryHackMe-Linux PrivEsc: https://tryhackme.com/room/linuxprivesc" This article is about Par... -
App Generation
Base44 vs. Lovable: Which Should Beginners Choose? A Practical Engineer Examines the Differences Based on Their Experience | Introduction to Vibe Coding
With the proliferation of no-code tools, many people are probably wondering, "Which one should I start with?" With attractive options like Base44 and Lovable, it can be hard to decide. In this article, we'll introduce some of the best no-code tools from the perspective of a current engineer.
