IDOR: The Coat Check Problem in Web Apps
Understanding Insecure Direct Object References (IDOR) and how to defend against them
Understanding Insecure Direct Object References (IDOR) and how to defend against them
How I found missing SRI using just curl and how it led to my first valid bug.
A Handy cheatsheet that you might require while writing some cool exploit scripts
Detailed blog on how to use the proxy configuration tool to stay anonymous
A Place to recall and revisit all the popular NMap commands
Deepdive into life of Aaron Swartz, the founder of reddit
A list of 60 most used linux commands for beginners
Understanding Command Injection Vulnerabilities and how to defend against them
Deep Dive into the Slowloris Denial-of-Service Attack and Its Mitigation Strategies
A Step-by-Step Guide to Capturing and Cracking WPA2 Handshakes Using Aircrack-ng