Cyber Offense and Defense Project - Università della Calabria
Client-side - CSRF where token validation depends on request method
Server-side - Blind OS command injection with output redirection
Expert - Exploiting XXE to retrieve data by repurposing a local DTD
https://github.com/Textualize/rich | https://github.com/SBoudrias/Inquirer.js | https://github.com/tiangolo/typer |
https://github.com/pallets/flask |
1. export FLASK_APP=backend.py
2. export FLASK_ENV=development
3. flask run
You can find a brief explanation of our work here