Creating custom username list & wordlist for bruteforciing. Creating custom username list & wordlist for bruteforciing.

During brute-forcing every time you need custom  password list & username list. Username list is as well as important as password list, ...

+ Read more »

How To Capture Passwords Across The Air - Network Traffic Analysis How To Capture Passwords Across The Air - Network Traffic Analysis

ABSTRACT      It is known that WireShark is a powerful tool that goes far beyond a simple sniffer. What many do not know is that there are s...

+ Read more »

Code Igniter XSS Filter Multiple Bypasses Code Igniter XSS Filter Multiple Bypasses

Recently we released our " XSS Filter Evasion Cheat Sheet ", i was quite surprised to hear the community feedback. The total downl...

+ Read more »

Bypassing Modern WAF's XSS Filters - Cheat Sheet Bypassing Modern WAF's XSS Filters - Cheat Sheet

Last month i was asked by my university teacher "Sir Asim Ali" to write a paper on any topic related to "Computer Architectu...

+ Read more »

Understanding This Technique Called MySQL Injection Understanding This Technique Called MySQL Injection

ABSTRACT It is known that computers and software are developed and designed by humans, human error is a reflection of a mental response to a...

+ Read more »

An Overview of Real World Account Hacking Strategies An Overview of Real World Account Hacking Strategies

I often get sick and tired of reading comments underneath a white-hat hacking tutorial, asking “ how do I hack a Gmail ”, “ How to hack Face...

+ Read more »

phpThumb Server Side Request Forgery phpThumb Server Side Request Forgery

Recently me along with my friend " Deepankar Arora " discovered a server side request forgery vulnerability inside of the phpThumb...

+ Read more »

XPATH Injection Tutorial XPATH Injection Tutorial

XPath is a language that has been designed and developed to operate on data that is described with XML. The XPath injection allows an attack...

+ Read more »
 
Top