Mohammad Awab Hassan NizamiPractical Bug Bounty — TCM Academy | Module 8LFI (Local File Inclusion) where an attacker can see local files present in web application server. RFI (Remote File Inclusion) where an…2d ago2d ago
Mohammad Awab Hassan NizamiPractical Bug Bounty — TCM Academy | Module 6Module 6 — Authorization AttacksJul 17Jul 17
Mohammad Awab Hassan NizamiPractical Bug Bounty — TCM Academy | Module 5Module 5 — Reconnaissance and Information GatheringJul 11Jul 11
Mohammad Awab Hassan NizamiPractical Bug Bounty — TCM Academy | Module 2,3,4Module 2 — Before We Attack (Preparation)Jul 8Jul 8
Mohammad Awab Hassan NizamiPractical Bug Bounty — TCM Academy | Module 1Module 1 — Web Application SecurityJul 7Jul 7
Mohammad Awab Hassan NizamiBasics of Active Reconnaissance — Offensive Security UnfoldedActive ReconnaissanceJun 29Jun 29
Mohammad Awab Hassan NizamiBasics of Passive Reconaissance — Offensive Security Unfolded.Passive ReconnaissanceJun 27Jun 27
Mohammad Awab Hassan NizamiBASICS OF WINDOWS FOR PENTESTERS — Offensive Security unfoldedBasic commands:Jun 25Jun 25
Mohammad Awab Hassan NizamiTheoretical Basics Of Penetration Testing — Offensive Security Unfolded Module 1.How can hacking be good?Jun 24Jun 24
Mohammad Awab Hassan NizamiIntroduction to Networking (Devops | Pentesting) Part-1 OSI ModelLearning the basics of networking is very important, I as a devops engineer, ignored learning networking which made alot of things very…Jun 22Jun 22