
Everything You Need to Know About CSV Injection
CSV injection might sound complex, but it’s easier to grasp than you think. Essentially, it involves slipping malicious formulas into

CSV injection might sound complex, but it’s easier to grasp than you think. Essentially, it involves slipping malicious formulas into

What is Frida? It is a dynamic instrumentation toolkit, Frida is used by testers to test security of mobile application,

Bug bounty hunting is a lucrative and challenging skill where ethical hackers identify and report security vulnerabilities in organizations’ systems.

Hello everyone! I am really happy to announce that I got my first valid bug from a target, and not

When it comes to cloud security, Amazon Web Services (AWS) is a prime target for penetration testers and malicious actors

Imagine a major online retailer. A sneaky hacker exploits a flaw. They sneak malicious code into the system. They access

Tor, short for “The Onion Router,” is a free and open-source software project aimed at enabling anonymous communication. It directs

What is Cross- site scripting? Cross- Site Scripting is a type of vulnerability commonly found in web applications. In XSS

Offensive Security offers free lab machines under their Proving Grounds library that I find super helpful to prepare for the