
System Weakness
@SystemWeakness
Followers
381
Following
0
Media
0
Statuses
4K
đĽď¸ We cover cybersecurity, ethical hacking, and everything in between.
Joined January 2022
Post Exploitation with PowerShell and Alternatives: What Happens After Youâre In #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
So, youâve just pwned a system. Youâve bypassed the firewall, landed a shell, or executed your payloadââânow what?
0
0
0
Website & API Security Boost with SafeLine Web Application Firewall #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
Websites and APIs are not only business-criticalâââtheyâre also constant targets for cyberattacks. From SQL injections to bot abuse andâŚ
0
0
0
iDocView RCE Vulnerability: How a Simple URL Leads to Remote Code Execution #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
> About Author Hi, Iâm Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built forâŚ
0
0
0
How an API Token Flaw Let Me Bypass Premium Restrictions #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
Hi Guys, Welcome back to yet another article, Today, I want to walk you through one of the bugs I found while hunting on HackerOne. I wasâŚ
0
0
0
PortSwigger Lab Walkthrough: Blind OS Command Injection with Time Delays #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
When it comes to exploiting web applications, nothing is more thrilling than turning a simple form input into a foothold on the server.
0
0
0
Do you Practice, but Still Feel Stuck at Bug Bounty? #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
Browsing Reddit recently, I found a lot of hunters who faced a common problem⌠They studied the theory, did CTFs, and spent time doing BugâŚ
0
0
0
[CVE-2025â54424] Critical RCE Vulnerability in 1Panel ProâââPatch Now! #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
> About Author Hi, Iâm Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built forâŚ
0
0
0
How the Tea App Exposed 72,000 IDs and 1.1 Million DMs: A Security Breakdown #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
When a women-first safety app becomes a data nightmareâââanatomy of the Tea app breach and how poor design fuelled a massive privacyâŚ
0
0
0
âJuicy 404sâ: How Broken Pages Spilled Secrets and Gave Me Admin Access #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
đŹ âEveryone chases 200 OK. I chase the errorsâââthatâs where the gold leaks.â
0
0
0
SafeLine vs. FortiWeb: Which WAF Fits Your Architecture? #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
Web Application Firewalls (WAFs) are critical for protecting modern web applications from evolving threats. FortiWeb is widely recognizedâŚ
0
0
0
Corridor Room THMâââWriteup of Exploit Vectors #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
Overview of the Corridor CTF Challenge
0
0
0
Prototype Pollution Vulnerability: Full Technical Guide #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
By Shah kaif | âOne polluted prototype can compromise an entire application.â | LinkedIn
0
0
0
I Tried CSRF Attacks in Many Website (And Failed Miserably). Hereâs What I Learned #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
By Shah kaif | âEach failed payload is basically my application telling me: âThanks for the pen-test, free of charge.â | LinkedIn
0
0
0
The Day I Started Thinking Like a Real Threat Hunter #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
Staring at 40GB of enterprise logs. 24 different data sources. Complete information overload.
0
0
0
Threat Modeling for AI Systems: STRIDE, DREAD, and Beyond #systemweakness #cybersecurity #ethicalhacking.
systemweakness.com
AI systems are no longer confined to experimental labs. They power real-world applications in healthcare, finance, critical infrastructureâŚ
0
0
0