Research Blog | Project Black
  • Home
  • Blog
  • About

Research

A collection of 5 posts
FileFlows SQL Injection by Decompiling .NET Code
Research

FileFlows SQL Injection by Decompiling .NET Code

Sometimes the good stuff isn’t on the surface. We turned to decompiling .NET code to find a hidden SQL injection flaw.
12 Jun 2025 4 min read
Vibe Hacking: Finding Auth Bypass and RCE in Open Game Panel
Research Featured

Vibe Hacking: Finding Auth Bypass and RCE in Open Game Panel

You've heard of vibe coding, but have you considered vibe hacking? I tried thinking less to find an authentication bypass and RCE in OpenGamePanel.
30 Apr 2025 5 min read
ZendTo NDay Vulnerability Hunting - Unauthenticated RCE in v5.24-3 <= v6.10-4
Research Featured

ZendTo NDay Vulnerability Hunting - Unauthenticated RCE in v5.24-3 <= v6.10-4

Discovering NDay flaws in ZendTo filesharing software highlighted an interesting fact: without the issuance of CVEs, vulnerabilities can easily go unpatched.
31 Mar 2025 7 min read
LiquidFiles Vulnerabilities: From Discovery to Disclosure
Research Featured

LiquidFiles Vulnerabilities: From Discovery to Disclosure

Join us in my quest to find some vulnerabilities in the Liquidfiles application! A full walkthrough awaits detailing the methodology and the findings that made all the effort worthwhile.
13 Feb 2025 10 min read
A Watchguard Vulnerability That's a "Feature" - GuardLapse
Research Featured

A Watchguard Vulnerability That's a "Feature" - GuardLapse

Picture this: a feature from a security appliance that willingly dispatches its password hashes to any device on the network. That is precisely what WatchGuard's SSO does under certain circumstances. Does a bad feature warrant filing a CVE? I'm not sure.
08 Oct 2023 4 min read
Page 1 of 1
Research Blog | Project Black © 2025
Powered by Ghost