IDOR Insecure direct object reference Unprotected admin functionality Greeting Everyone ! today In this Blog We will explore One Most Common Vulnerability which present in every website IDOR Read More » February 16, 2023 4:22 pm
Blind OS Command Injection through OOB Technique Greeting Everyone! Hope everything Going well And Good today In this Blog We will Explore Blind OS Command Injection Which Read More » February 16, 2023 4:22 pm
Find Hidden Endpoint From JS File Greeting Everyone ! Today In this Blog We will Explore How To Recon Javascript and How To extract all Javascript Read More » February 16, 2023 4:22 pm
FFUF A guide to Content Discovery using FFUF Greeting everyone! Hope All going well Today In This Blog We will explore How To utilize the Content Discovery Phase Read More » February 16, 2023 4:22 pm
XSS Validator Extension Find Your XSS Easily Greeting Everyone! Hope All Going well In Todays Blog Post we will explore One Of the most Burp extensions which Read More » February 16, 2023 4:22 pm
Modern Day Trading and its Cyber Risk Hey Guys, Its been So long that I posted a Blog right?My friends were asking me, what is trading and Read More » February 16, 2023 4:22 pm
Email Pentesting Welcome back guys to another blog in the pentesting series. Today we will explore about email pentesting and various ways Read More » February 16, 2023 4:22 pm
Another Way To Bypass OTP Schema Weak Signup flow Takeover Existing User Account! Greeting Everyone ! Today In this Blog we will discuss About Another way to OTP bypass. How we Able to Read More » February 16, 2023 4:22 pm
Up to 500 million Facebook users phone numbers, email-id and other personal information leaked Data breach common cyber Attack which grow day by day ! according to the news site Insider over 533 million Read More » February 16, 2023 4:22 pm