Marduk_James 

21 Followers
85 Following
158 Posts

Aspiring cybersecurity "something".
Just starting my journey, lets see where I end up!

Discord: marduk_james
Twitter: @Marduk_James
Medium: @marduk.i.am

A lot of XSS write-ups focus on HTML injection (innerHTML, document.write, etc).

But navigation-based sinks are just as dangerous.

If user input reaches location.href, a javascript: URI can turn a redirect into code execution in the page’s context.

I put together a practical breakdown with examples and real-world patterns:

https://medium.com/@marduk.i.am/why-location-href-isnt-just-a-redirect-f7c77c0e4bcd

#xss #cybersecurity #bugbounty

Why location.href Isn’t Just a Redirect:

Understanding Navigation-Based XSS

Medium

A breakdown of how execution context determines whether your payload fails or fires — using hands-on PortSwigger labs.

#xss #BugBounty #ethicalhacking #CyberSecurityAwareness

https://medium.com/@marduk.i.am/context-is-everything-a-practical-guide-to-xss-eff8d30421df

Context Is Everything: A Practical Guide to XSS

Understanding XSS Using Five Portwigger Labs.

Medium

One of my first Kali Linux VMs… and I forgot the password

Instead of rebuilding it, I explored snapshot disk analysis and mounted the VDI to recover the data.

#Linux #digital-forensics #cybersecurity #ethical-hacking #virtualization

https://medium.com/@marduk.i.am/vm-snapshot-disk-recovery-657019478cbe

🛠 VM Snapshot Disk Recovery

Snapshot Analysis and Password Recovery in a Kali Linux Virtual Machine

Medium

New CTF walkthrough for TryHackMe's RootMe. This is a fun one!

I just published RootMe (CTF Walkthrough) https://medium.com/p/rootme-ctf-walkthrough-efe69ef73510?source=social.tw

#TryHackMe #Cybersecurity #ReverseShell #CTF #PenetrationTesting

RootMe (CTF Walkthrough)

A TryHackMe Lab

Medium
Amass 5.0.0 Usage for Recon

OWASP Tool

Medium
Visible Error-Based SQL Injection

A Portswigger Lab

Medium
Blind SQL Injection with Conditional Errors

A Portswigger Lab

Medium
Recon Methodology: JavaScript File Hunting

Bounty Hunting Through JS files

Medium