6 followers
I am an engineering student, with some knowledge of web development.
In this article we will see that how hacker/penetration testers can exploit broken authentication vulnerability, in the authentication system of a...
In this article I am going to share a checklist which you can use when you are doing a penetration test on a website, you can also use this list as a...
In this article we will see how to use a tool named “amass” which is used for reconnaissance when doing website penetration testing or bug bounty....
In this article we going to learn about CSRF and SSRF, both of these vulnerabilities take advantage of how server process URLs. These are very common...
In this article I am going to show you how to make a command line tool that will encrypt a file or decrypt a file. This command line tool is going to...