by TJ Toterhi | Feb 5, 2026 | Offensive Operations, Technology
In Part 1 and Part 2, we covered the fundamentals and intermediate techniques. Now we’ll explore curl’s automation capabilities through globbing, handling various authentication schemes, and learn techniques for bypassing common restrictions. These skills...
by TJ Toterhi | Jan 29, 2026 | Offensive Operations, Technology
In Part 1 of our series of curl usage, we covered the fundamentals: headers, request methods, and basic data submission. Now we’ll look at some techniques that’ll make you look like a curl pro. We’ll be covering cookies, SSL certificate handling, and...
by TJ Toterhi | Jan 22, 2026 | Offensive Operations, Technology
If you’re new to penetration testing, curl might seem like just another command line tool in an already overwhelming toolkit. But here’s the thing: curl is likely the most universally available HTTP client you’ll encounter. Whether you’ve just...