Mukund KediaReverse Engineering — Malware Analysis — 1Hashing can be used to identify a malicious software. Such software can be passed through a hashing program. The hash generated can be…Mar 19Mar 19
Mukund KediaASP.NET securityIf we use Razor pages, then there is an option to use ‘@’. Using ‘@’ to display text on the screen would HTML encode some characters like…Feb 19Feb 19
Mukund KediaObservations while learning Web app security(Will try to update it regularly)Sep 2, 2021Sep 2, 2021