Skip to content
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team

Tag: pentesting

HTTP Request Smuggling in 2025: How to Distinguish Real Desync Vulnerabilities from HTTP Request Pipelining (And Stop Wasting Everyone’s Time)
pentesting

HTTP Request Smuggling in 2025: How to Distinguish Real Desync Vulnerabilities from HTTP Request Pipelining (And Stop Wasting Everyone’s Time)

Introduction We saw this in 2019 after James popularized modern desync attacks. We saw it again in 2024 after his

by ☣️ Mr. The Plague ☣️
Read More
Discover CyberDeck: The Ultimate Hacker’s Cookbook for Penetration Testing
Cyber Security

Discover CyberDeck: The Ultimate Hacker’s Cookbook for Penetration Testing

In the high-stakes world of simulating advanced persistent threats (APTs), exploiting vulnerabilities, and hunting for weaknesses in complex systems, efficiency

by ☣️ Mr. The Plague ☣️
Read More
New Episode of SquidSec Podcast is Live! –
Educational

New Episode of SquidSec Podcast is Live! –

by ☣️ Mr. The Plague ☣️
Read More
Abusing Software Supply Chain Vulnerabilities: A Comprehensive Analysis of Attacks, Techniques, and Defenses
red-team

Abusing Software Supply Chain Vulnerabilities: A Comprehensive Analysis of Attacks, Techniques, and Defenses

Introduction Software supply chain attacks have become a cornerstone of modern cyber threats, exploiting the intricate web of dependencies, tools,

by ☣️ Mr. The Plague ☣️
Read More
Major Cybersecurity Incidents and Trends in May 2025: A Comprehensive Overview
Cyber Security

Major Cybersecurity Incidents and Trends in May 2025: A Comprehensive Overview

Cybersecurity threats continued to evolve in May 2025, with high-profile incidents, critical vulnerabilities, and emerging trends reshaping the landscape. From

by ☣️ Mr. The Plague ☣️
Read More
ScreenSniper: A Powerful Tool for PenTesting and Webpage Analysis
Cyber Security

ScreenSniper: A Powerful Tool for PenTesting and Webpage Analysis

In the fast-evolving world of cybersecurity, penetration testers need efficient tools to identify vulnerabilities quickly and accurately. Enter ScreenSniper, a

by ☣️ Mr. The Plague ☣️
Read More
Mastering Server-Side Request Forgery (SSRF) Exploitation in 2025
Exploits

Mastering Server-Side Request Forgery (SSRF) Exploitation in 2025

Server-Side Request Forgery (SSRF) is one of the most critical web vulnerabilities professionals in cybersecurity must understand. This powerful exploit

by ☣️ Mr. The Plague ☣️
Read More
Critical SAP Vulnerability CVE-2025-31324: What You Need to Know
blue-team

Critical SAP Vulnerability CVE-2025-31324: What You Need to Know

In the fast-evolving world of cybersecurity, a new threat has emerged that demands immediate attention from organizations relying on SAP

by ☣️ Mr. The Plague ☣️
Read More
Cyber Gossip: Top Cybersecurity Discussions in the Hacking Community this Week
Cyber Security

Cyber Gossip: Top Cybersecurity Discussions in the Hacking Community this Week

In the ever-evolving world of cybersecurity, staying informed about the latest threats and incidents is crucial for professionals tasked with

by ☣️ Mr. The Plague ☣️
Read More
Critical ASUS Router Vulnerability: Understanding and Mitigating CVE-2025-2492
News

Critical ASUS Router Vulnerability: Understanding and Mitigating CVE-2025-2492

In the ever-evolving landscape of cybersecurity, a new critical vulnerability has emerged that demands the attention of network administrators, penetration

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

1 2 … 4 Next
© SQUID SEC 2025 - Website developed by WP Theme Space | Create Your Professional Website