Adithyakrishna VinTowards DevBusiness Logic Vulnerabilities or Application Logic Vulnerabilities or simply “logic flaws”Business logic vulnerabilities, also known as application logic vulnerabilities, refer to security flaws or weaknesses in the logical flow…5 min read·May 18, 2024----
Adithyakrishna VinTowards Devgdb: How To Use In CTFsgdb (GNU Debugger) is a powerful tool for debugging programs in C and other languages. It allows you to inspect the program's state, set…3 min read·Dec 21, 2023----
Adithyakrishna VALGORITHMSI’m making this for my quick reference for what I learned from the video series below and other sources.5 min read·Dec 11, 2023----
Adithyakrishna VinTowards DevJWT attacksHow it normally works vs How jwt works (nothing saved in server).13 min read·Aug 12, 2023----
Adithyakrishna VinTowards DevPrototype PollutionIn client-side JavaScript, this commonly leads to DOM XSS, while server-side prototype pollution can even result in remote code execution.6 min read·Jul 4, 2023----
Adithyakrishna VChicago American Nazi Party: HackThisSiteFrom: DestroyFascism2 min read·May 14, 2023----
Adithyakrishna VinTowards DevUncle Arnold’s Local Band Review: HackThisSite-RealisticHackThisSite Playlist:2 min read·May 10, 2023----
Adithyakrishna VSPAMMER: spam words in WhatsApp, Instagram, and anywhereimport time: This line imports the time module in Python, which provides various time-related functions.1 min read·May 8, 2023----