Vulnerability Vault: Breaking Down SSRF — Server Side Request Forgery (Part 2)Welcome to “Vulnerability Vault ,” a dedicated series where we unravel the mysteries of cybersecurity vulnerabilities, one byte at a time…Mar 10Mar 10
Vulnerability Vault: Breaking Down SSRF — Server Side Request Forgery (Part 1)Welcome to “Vulnerability Vault,” a dedicated series where we unravel the mysteries of cybersecurity vulnerabilities, one byte at a time…Mar 8Mar 8
Bypassing the Windows Login??Hello everyone, You’ve probably looked up this subject a lot in various circumstances, such as when you lost your password, someone reset…Feb 20Feb 20
Demystifying Cyber Threats: A Journey Through Threat IntelligenceImagine standing guard at the gateway of our digital universe, where the line between safety and vulnerability blurs with every click. This…Feb 12Feb 12
Understanding and Implementing Cyber Security Compliance(GDPR, DPA, ISO): A Comprehensive GuideRecently, I decided to learn about the basic rules and guidelines that companies follow to keep our online information safe, which is known…Jan 26Jan 26
Hack The Box — Cozy HostingThe “CozyHosting” device, designed by “commandercool”, is an accessible level machine primarily concentrating on web application security…Dec 7, 20231Dec 7, 20231
The Fast and Secure Web: Exploring QUIC (HTTP/3) — The Next Generation HTTP and its Robust SecurityIntroductionJun 26, 2023Jun 26, 2023
Try Hack Me (THM): Pre-Security Path →Part 1First of all, I would like to thank Josh Mason for providing me a THM premium subs which has given me driven force to work more and learn…Jul 19, 2021Jul 19, 2021
eJPT Course Review: INE Penetration Student (PTS)CoursePTS (Penetration Testing Student) is a course for beginner level certification eJPT (eLearnSecurity Junior Penetration Tester). PTS is…Jul 18, 2021Jul 18, 2021