Muhammad BilalHackThisSite — Basic ChallengesOne morning, I realized I had been out of practice for the last few months in critical highly focused challenges. Instead, I focused on…Oct 23
Saurabh GuptaPre Auth Account TakeoverA uthentication is essential for protecting the security, privacy, and integrity of digital systems. It confirms the identity of users…Dec 31
Aniket DasHackTheBox Academy-Session Security-Skill Assessment(WriteUp)Hey everyone! Welcome back. Long time no see. And ya, Happy 2k24. Was not here for a while as was engaged into HackTheBox Academy…Feb 5Feb 5
Vijay GuptaWeb Penetration Testing: Safeguarding Your Online PresenceIn today’s digital age, where the internet serves as the backbone of businesses, communication, and daily life, security concerns loom…Apr 26Apr 26
Muhammad BilalHackThisSite — Basic ChallengesOne morning, I realized I had been out of practice for the last few months in critical highly focused challenges. Instead, I focused on…Oct 23
Saurabh GuptaPre Auth Account TakeoverA uthentication is essential for protecting the security, privacy, and integrity of digital systems. It confirms the identity of users…Dec 31
Aniket DasHackTheBox Academy-Session Security-Skill Assessment(WriteUp)Hey everyone! Welcome back. Long time no see. And ya, Happy 2k24. Was not here for a while as was engaged into HackTheBox Academy…Feb 5
Vijay GuptaWeb Penetration Testing: Safeguarding Your Online PresenceIn today’s digital age, where the internet serves as the backbone of businesses, communication, and daily life, security concerns loom…Apr 26
LaxiousSQL injection vulnerability allowing login bypassSQL Injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its…Nov 17
Ahmed Fahim (Elliot)What is the Open Redirect vulnerability, find it, and protect against itللإطلاع علي النسخة العربيةMar 5, 2023
Harsh RahulVulnerabilities in http://thriftclothes.in/oahmsThis blog showcase the vulnerabilities that this website consists and how I exploited those vulnerabilities; this doesn’t describe each…Feb 10