Harshleen chawlaScript-Based Guide to Injection Attacks: SQLi, XSS, Command, XML, and HTMLHave you ever wondered how Pen-testers uncover vulnerabilities lurking in web applications? 🤔In this blog, we will delve into various…May 31May 31
Harshleen chawla11. Don't-use-client-sideClient-side vulnerabilities refer to security weaknesses in web applications that can be exploited by attackers through the user’s browser…May 16May 16
Harshleen chawlaPico CTF- Web exploitation walkthrough #Part-2 (6–10)6. CTF- More cookiesMar 24Mar 24
Harshleen chawlaNettacker — Automated Penetration Testing FrameworkIntroduction Vulnerability Scanning is a crucial process for identifying security flaws in web-based applications. Automated scanning…Feb 23Feb 23
Harshleen chawlaDiscovering the Basics of CewlHello readers! Today, we’re diving into Kali Linux’s “Cewl” tool, your go-to for crafting wordlists. Let’s uncover its features and explore…Feb 4Feb 4
Harshleen chawlaThe Two Sides of the Algorithm: Offensive and Defensive AI in a Digital Arms RaceIn the digital landscape’s evolution from lawless chaos to a sophisticated ecosystem, an unseen conflict wages between Offensive AI, a…Jan 15Jan 15