Cross-Site Scripting (XSS) is a type of security vulnerability in web applications that allows an attacker to inject malicious scripts…
Author: Rocky
According to MITRE, “Adversaries can use the COM system to insert malicious code that can be executed in place of…
Hello everyone! My name is Rocky Sah and I am here to share my story about how I started freelancing…
Make some room in your bookshelves, because it’s book review time! 🔖 📚 What is Node.js? Node.js is a server-side…
Keyloggers, as the word itself suggests, function by logging or capturing keys or key strokes. Technically, a keylogger is a software tool or…
Hello everyone, my name is Rocky and I am a web developer and hacker. Today, I want to address a…
Bug bounty hunting is a process of identifying and reporting vulnerabilities in a company’s online assets. It is a lucrative…
Vulnerability scanning is a crucial aspect of maintaining the security of computer systems and networks. It is the process of…
CVE 2022-0847 is a privilege escalation vulnerability discovered by Max Kellerman present in Linux Kernel itself post versions 5.8 which…
Hey Folks, today’s article is going to be very interesting because we are going to talk about a method using which…
Hello to all beginner bug hunting fellows. This is Rocky, today i came with an another blog on login page.…
Web application security is critical in today’s digital world, and web application penetration testing is a crucial part of ensuring…
In the beginning, social engineering was an art of social science. It is used to change people’s behaviour and make…
Hello everyone, my name is Rocky Sah and I am an ethical hacker, web developer, and the founder of codelivly.…