Hi, im Eno
This site is an absolute train wreck. The writing? Trash. The logic? Non-existent. The depth? About as deep as a kiddie pool. I have no idea what I’m doing, and honestly, I’m just here to watch the chaos unfold. Feel free to roast, critique, or straight-up obliterate it—just don’t expect me to care.
Cheers
Latest Articles
![Connect Magic Mouse 2 on Arch Linux (Without Losing Your Mind)]() - Connect Magic Mouse 2 on Arch Linux (Without Losing Your Mind)- So, you got yourself a Magic Mouse 2 and you're running Arch Linux ? Good luck, buddy. Unlike… 
![Security Posture Assessment]() - Security Posture Assessment- Methodology The security assessment focused on evaluating vulnerabilities within the target system's… 
![Shopware - Server Side Template Injection]() - Shopware - Server Side Template Injection- Overview: Shopware is an open-source e-commerce platform built on the Symfony Framework and Vue.js… 
![Direct Object Injection Vulnerability]() - Direct Object Injection Vulnerability- As part of our Continuous Automated Red Teaming and Attack Surface Management capabilities within… 
![NateMail Vulnerabilities – CVE-2019-13392]() - NateMail Vulnerabilities – CVE-2019-13392- Welcome to the Security Dumpster Fire 🚨🔥 NateMail v3.0.15 is a hot mess . We’re talking XSS… 
![OWASP API Security Injection]() - OWASP API Security Injection- OWASP API Security Injection So, you’ve probably heard of Top 10 OWASP , right? That’s basically… 
![OWASP API Security Broken User Authentication]() - OWASP API Security Broken User Authentication- API Security Yo, you’ve probably heard about Top 10 OWASP , aka the ten nastiest vulnerabilities… 
Latest Ctf Write
![Cyberthon 2021 Finals - APCDB (pwn)]() - Cyberthon 2021 Finals - APCDB (pwn)- We've found a network service that seems to be posing as a fake directory of APOCALYPSE members… 
![confusion bug in ChakraCore]() - confusion bug in ChakraCore- Introduction Chakrazy is a browser CTF challenge created by team PPP for the 2017 PlaidCTF event… 
![33C3 CTF  feuerfuchs challenge]() - 33C3 CTF feuerfuchs challenge- Introduction So I've been playing with the browser exploitation recently, by studying some browser… 
![MeePwn CTF 2017 - Old School]() - MeePwn CTF 2017 - Old School- Category: Pwnable 64 bit ELF, Partial RELRO, NX enabled, No PIE, has canary. As we can see we can… 
![MeePwn CTF 2017 -- Brainfuck 1 & 2]() - MeePwn CTF 2017 -- Brainfuck 1 & 2- Category: Pwnable Both binaries are 64 bit ELF, No RELRO, No canary, PIE & NX enabled. Brainfuck… 
![MeePwn CTF 2017 - anotherarena]() - MeePwn CTF 2017 - anotherarena- Category: Pwnable 64 bit ELF, Partial RELRO, canary & NX enabled, No PIE. The program is a simple… 
![DEFCON CTF 2017 Quals - badint]() - DEFCON CTF 2017 Quals - badint- Category: Potent Pwnables 64 bit ELF, Partial RELRO, NX enabled, No canary & PIE. libc not… 













