-
Building a Private Security Auditor: How to Scan Public GCP Buckets Using MCP, Ollama, and Gitleaks
In this article, I share with you all the steps I followed to create an MCP server in order to enable an LLM to scan files in a GCP public bucket to identify secrets (API keys, SSH keys, passwords, etc). To start with, if you’re not familiar with GCP, a Google Cloud Storage or a…
-
The power of parameters, headers and cookies enumeration
This is an article I wrote for a hacking magazine back in 2020 about one of the most powerful features of Burp Suite : Web and mobile applications are gaining a huge reputation among other Human Machine Interfaces (HMI). Today’s applications are so huge. One application may cover many business units, like online shopping and…
-
OS command execution on an online java emulator
Many websites offer end users an interface to execute java code. To protect their system against harmful code, many web developers aim to block code that allows to execute OS commands. This can be done either by deleting an entire function from a package or by using filters. In the following, I will show you…