During brute-forcing every time you need custom password list & username list. Username list is as well as important as password list, ...
How To Capture Passwords Across The Air - Network Traffic Analysis
ABSTRACT It is known that WireShark is a powerful tool that goes far beyond a simple sniffer. What many do not know is that there are s...
Code Igniter XSS Filter Multiple Bypasses

Recently we released our " XSS Filter Evasion Cheat Sheet ", i was quite surprised to hear the community feedback. The total downl...
Bypassing Modern WAF's XSS Filters - Cheat Sheet

Last month i was asked by my university teacher "Sir Asim Ali" to write a paper on any topic related to "Computer Architectu...
Understanding This Technique Called MySQL Injection
ABSTRACT It is known that computers and software are developed and designed by humans, human error is a reflection of a mental response to a...
Subscribe to:
Posts (Atom)