We often confront with software applications that are either password protected or require certain conditions to proceed. One way to…
Password cracking refers to various measures used to discover computer passwords. This is usually accomplished by recovering passwords from data…
Hello everyone, one of the most interesting functions is file uploading, vulnerabilities in file uploads usually lead you to critical…
Bug bounty programs are becoming increasingly popular among security researchers and ethical hackers who are interested in identifying vulnerabilities in…
Hacking has been a popular topic in recent years, with more and more individuals becoming interested in the world of…
Hello World! I haven’t posted a writeup in a long time.Since the middle of 2022, I’ve been devoting my time…
Maximus was a driven and ambitious web developer, who wanted to showcase his skills and portfolio to the world. To…
Reverse engineering is the process of analyzing and understanding a system, product, or component in order to determine how it…
When it comes to bug bounty, there are a lot of things that can be done in order to find…
These days, it seems that hardly a week goes by without at least one report of a data breach. A store may…
Cross-Site Scripting (XSS) is a type of security vulnerability in web applications that allows an attacker to inject malicious scripts…
According to MITRE, “Adversaries can use the COM system to insert malicious code that can be executed in place of…
Hello everyone! My name is Rocky Sah and I am here to share my story about how I started freelancing…
Make some room in your bookshelves, because it’s book review time! 🔖 📚 What is Node.js? Node.js is a server-side…