Understanding Fileless Malware
A deep dive into how fileless malware operates and how to defend against it
A deep dive into how fileless malware operates and how to defend against it
How I found missing SRI using just curl and how it led to my first valid bug.
A Handy cheatsheet that you might require while writing some cool exploit scripts
Detailed blog on how to use the proxy configuration tool to stay anonymous
A Place to recall and revisit all the popular NMap commands
Deepdive into life of Aaron Swartz, the founder of reddit
A list of 60 most used linux commands for beginners
Understanding Server-Side Request Forgery (SSRF) and how to defend against them
Understanding Insecure Direct Object References (IDOR) and how to defend against them
Understanding Command Injection Vulnerabilities and how to defend against them