coH4nSERTİFİKA OTORİTESİ [TR]Herkese Merhaba bu yazımda sizlere Sertifaka otoritelerini veya herkes tarafından bilenen SSL/TLS nasıl çalıştığını ifade etmeye…Sep 12Sep 12
enigmaGoogle Dorks Secrets: Discover Hidden Endpoints & Parameters with Google DorksIntroduction:Sep 71Sep 71
Abhijeet kumawatDay 21 of 30 Days — 30 Vulnerabilities | OAuth MisconfigurationsDay 21: Mastering OAuth Misconfigurations Vulnerability — Essential Tricks & Techniques Based on Personal Experience and Valuable POCsAug 28Aug 28
Nelson NjugunaWeek 1 Report: HCS — Penetration Testing Internship 2024Target URL: http://test.php.vulnweb.comJul 18Jul 18
Hemdeep GamitinSystem WeaknessBreaking Business Logic — Part: 42–4= 2Hello Hunters & Ninjas, Now I’m back with my new write-up, First of all request to accept my apology friends for this too late write-up…Jun 132Jun 132
Ramkumar SBurp Suite: A Journey Through Web Application Security TestingImagine you’re embarking on an exciting journey into the world of web security. You’ve heard about the dangers lurking in web applications…Jun 8Jun 8
Varsha ChahalDemystifying CSRF: Insights, Experiments, and Effective PayloadsCSRF(Cross-Site Request Forgery) is a web security vulnerability in which an attacker forces a victim to perform an unintended action…May 1May 1
AuspiciousMAL: Malware Introductory TryHackMe WalkthroughTask 01. What is the Purpose of Malware AnalysisApr 18Apr 18
Kh RasikhSecure Web Apps using Content-Security-Policy(CSP)Content Security Policy (CSP) stands as a crucial component in modern web application security, offering a potent defense against a myriad…Feb 23Feb 23
Ayutsede PreciousSQL injection UNION attack to retrieve interesting dataOnce you have identified the number of columns required in your injected query, and have found which column can hold string data, you are…Feb 22Feb 22