PinnedPublished inSystem WeaknessDjango Web-Framework vs Burp Suite ProxyThis is Part 1 of an on going series where we are going to build a web app using Python’s Django framework while simultaneously testing its…May 15, 2022May 15, 2022
PinnedPublished inPython in Plain EnglishHow to Investigating DLL Logs with PythonA guide on investigating DLL logs with Python.Feb 19, 20221Feb 19, 20221
PinnedPublished inPython in Plain EnglishNetwork Traffic Analysis with PythonHow you can use Python to analyze network traffic activity.Feb 3, 2022Feb 3, 2022
PinnedUnderstanding Web Fuzzing for Ethical HackingWebsites have unique addresses just like your home address known as a Uniform Resource Locator (URL). If multiple entities shared one…Jan 8, 2022Jan 8, 2022
Published inSystem WeaknessFile Upload VulnerabilitiesFrom Storing Malware to potentially hitting a Denial of Service Attack, this vulnerability affects both users and application servers Jan 22Jan 22
pdf payload%PDF-1.3 %öäüß 1 0 obj << /Type /Catalog /Pages 2 0 R /OpenAction 3 0 R >> endobj 4 0 obj << /Producer (Haru Free PDF Library 2.0.8) >>…Mar 2, 2023Mar 2, 2023