π»Desktop AppSec
How did I gain RCE and dump the database from the exploit desktop application?
Beyond the Desktop: Exploiting a Leaked Token for API | Strik3r Blog
Last updated
Was this helpful?
How did I gain RCE and dump the database from the exploit desktop application?
Beyond the Desktop: Exploiting a Leaked Token for API | Strik3r Blog
Last updated
Was this helpful?