
WordPress Security Checklist
WordPress is a very popular blogging CMS (Content Management System) that is used to make e-commerce websites, blogging websites, and […]
Bug bounty methodologies, write ups and different tools.
WordPress is a very popular blogging CMS (Content Management System) that is used to make e-commerce websites, blogging websites, and […]
This is just a brief blog post to give a list of Android apps that are intentionally insecure and can […]
A framework for web penetration testing built on Java is called Burp Suite. Information security specialists now employ it as […]
SQL Login bypass is a method of accessing the dashboard of an application without needing a username or password. In […]
Greeting’s pen-testers. Today we are going to set up a simple lab for Android Pentesting using Genymotion and Magisk Framework […]
A piece of software that can be installed in a browser and allows you to personalize a web browser for […]
What is an admin panel? An admin panel of the website or web application is like a management system used […]
SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes […]
Oracle SQL injection is a security vulnerability that arises in applications that use oracle DB as a database. By the […]
Google dorks are a set of rules or tags to narrow down google searching for specific content. With the help […]