Engr. Md. Hasan MonsurBuilding a Full-Featured API Monitoring Service with C#, ASP.NET MVC, and DapperDiscover how to build a robust API monitoring service using C#, ASP.NET MVC, and Dapper. This article provides a step-by-step guide on…Oct 4Oct 4
Liwei ZhouHack the Box — Walkthrough DevvortexObtaining root user on Devvortex machine of HTB — A walkthroughJun 8Jun 8
AnkitsinhaHTB Walkthrough: HeistHeist is an easy difficulty Windows box with an portal accessible on the web server, from which it is possible to gain Cisco password…Aug 30Aug 30
Engr. Md. Hasan MonsurBuilding a Full-Featured API Monitoring Service with C#, ASP.NET MVC, and DapperDiscover how to build a robust API monitoring service using C#, ASP.NET MVC, and Dapper. This article provides a step-by-step guide on…Oct 4
Liwei ZhouHack the Box — Walkthrough DevvortexObtaining root user on Devvortex machine of HTB — A walkthroughJun 8
AnkitsinhaHTB Walkthrough: HeistHeist is an easy difficulty Windows box with an portal accessible on the web server, from which it is possible to gain Cisco password…Aug 30
Tanmay BhattacharjeeCross Site Scripting(XSS) | DVWA(Damn Vulnerable Web Applications)XSS is a technique in which attackers inject malicious scripts into a target website and may allow them to gain access control of the…Aug 5, 2020
RajdipHow I Discovered My First CVE and How You Can Find Yours Too!Hey folks!!, Rajdip here, and I’ve got an exciting write-up for you today. We’ll be delving into the intriguing world of cybersecurity…Aug 31, 20232