Project Forgery: Automating CSRF Exploit GenerationA tool for generating Cross-Site Request Forgery (CSRF) exploit HTML for security testing.Oct 4, 2023Oct 4, 2023
Automating Reconnaissance with Sling Shot R3con — powered by project Discovery toolsAs developers and security enthusiasts, we often find ourselves automating repetitive tasks to save time and increase efficiency. In the…Sep 21, 20231Sep 21, 20231
Mastering Reconnaissance with Project DiscoveryDissect your target during reconnaissance with Project DiscoverySep 18, 20231Sep 18, 20231
100 days of hacking day 16 — Uncovering Vulnerabilities: A Practical Walkthrough of Components…Welcome back to the next chapter in our exploration of online security flaws, this time with a focus on “Components with Known…Sep 13, 2023Sep 13, 2023
Unmasking Vulnerabilities: Exploring OWASP’s Top 10 — Components with Known VulnerabilitiesAs we near the end of our journey through the OWASP Top 10 vulnerabilities, the ten most serious web security threats, we reach a point…Sep 12, 2023Sep 12, 2023
100 days of hacking: day 14 — Unmasking the World of Cyber Threats: Understanding Attackers and…IntroductionSep 11, 2023Sep 11, 2023
100 days of hacking-Day 13 Demystifying the OWASP Top 10: Unearthing Cross-Site Scripting (XSS)Welcome to Day 13 of our 100-day hacking adventure. Today, we’re continuing our look at the OWASP Top 10 vulnerabilities, this time…Sep 10, 2023Sep 10, 2023
100 days of hacking-day 11 — Unraveling the OWASP Top 10: Understanding Security MisconfigurationsIn our continuous exploration of the realm of web security, we are delving deep into the OWASP Top 10 vulnerabilities — the ten most…Sep 9, 2023Sep 9, 2023
100 days of hacking-Day 11: Understanding and Mitigating Broken Access Control VulnerabilitiesStaying ahead of potential dangers is critical in the ever-changing world of web security. The OWASP Top 10 vulnerabilities provide a…Sep 8, 2023Sep 8, 2023