Insights & Research Blog

My exploit demo of COPY FAIL (CVE-2026-31431): Proof that containers aren't a universal shield

My exploit demo of COPY FAIL (CVE-2026-31431): Proof that containers aren't a universal shield

0:00 /1:19 1× A common misconception in the industry is that containerization inherently provides an impenetrable security boundary. Organizations often fall into the trap of assuming that deploying applications in containers is a complete security solution in itself. While CVE-2026-31431 is a vulnerability within the Linux kernel and not the container runtime itself, it perfectly illustrates the fragility of container isolation. It serves as a stark
Exploiting RCE in Apache Tomcat 10.1.53 (CVE-2026-34486) [+Video PoC]

Exploiting RCE in Apache Tomcat 10.1.53 (CVE-2026-34486) [+Video PoC]

CVE-2026-34486 is a critical vulnerability in Apache Tomcat Tribes, the framework responsible for session replication and clustering, specifically affecting the following versions where the fail-open regression was introduced: * Apache Tomcat 11.0.20 * Apache Tomcat 10.1.53 * Apache Tomcat 9.0.116 This vulnerability impacts the specific set of releases rolled out in March 2026. 💡Disclaimer: This material is for educational and security research purposes only. The author is not responsible
Intentionally vulnerable web application: SQL Injection + RCE + Privilege Escalation

Intentionally vulnerable web application: SQL Injection + RCE + Privilege Escalation

I've created a custom-built vulnerable web application designed to take you on a classic exploitation journey: from a simple SQL Injection to Remote Code Execution, and finally, full root access. No complex setup required. All you need is Docker and a single command to launch your own personal hacking playground. Recommended challenge workflow: * Identify the SQL Injection vulnerability. * Obtain a shell through the vulnerable PostgreSQL instance. * Escalate privileges to gain root access.
Practical Exploitation of Server-Side Template Injection (SSTI) in Flask with Jinja2

Practical Exploitation of Server-Side Template Injection (SSTI) in Flask with Jinja2

To give you a practical look into one of my favorite web vulnerabilities, I’ve built a purpose-built lab focused on Server-Side Template Injection (SSTI). I've seen how this flaw can lead directly to Remote Code Execution (RCE), and I wanted to create a safe environment for you to see it too. This application allows you to locally and safely explore the entire exploitation process from discovery to compromise. I designed it as an entry-level challenge, making it the perfect starting point if you