FireShell Security Team
Home Team Articles Sponsors About



Restricted Linux Shell Escaping Techniques

Abstract The focus of this article is on discussing and summarizing different techniques to escape common Linux restricted shells and...

Bug Bounty Programs for Fun and for Profit

Want to hack Google and Facebook and get on well? Or are you looking for a reward for doing good...

Pentesting Vulnerable Study Frameworks Complete List

Exhaustive list maintained by Felipe “d4rc0d3x” Martins with indications of vulnerable applications for the study of pentesting, for both beginner...

© 2017 - 2018 FireShell Security Team. All rights reserved.