My first Hall Of Fame with a chained Broken Access Control | by Naman Jain | Feb, 2023

This blog is about how I got my first HOF after chaining multiple bugs. Let’s get started. In simple words, BAC means you are able to perform certain actions or fetch certain files which you are not authorized to. Let’s

Don’t Give Up On XSS! | Fun Firefox XSS | by Fırat | Feb, 2023

There’s always a way to exploit xss in different contexts I got an invite from a private program on hackerone and started searching for some vulnerabilites. After a while of searching, i found an url that had some interesting parameters.

Increasing your website’s security | by Adam J Sturge | Feb, 2023

I will be going over things you can add to your company’s code base to increase the security of your app. Photo by Taylor Vick on Unsplash Before I go into detail about the various changes, I’m going to mention

I tried to squiz the best from the most bizzar CVE I ever seen (CVE-2021–38759) | by LeoX | Jan, 2023

I was quite surprised to come across this funny CVE, as it was the most bizarre one I had seen so far. This particular CVE was related to Raspberry Pi and the author used default credentials of raspberry OS (user:

Metasploit and Metasploitable 2 installation

In this new Metasploit tutorial we will be installing and configuring Metasploit on Kali Linux and the Metasploitable 2 virtual machine on VMware Player. Metasploit is one of the most popular and top rated penetration testing tools on the market and

Metasploit commands – Y3llowl4bs

In this article we will be talking about the very basics of Metasploit and the Metasploit commands used in the command line interface. At first the MSF console command line and the number of available commands might seem a lot and

Top 10 Wifi Hacking Tools in Kali Linux by Y3llowl4bs

In this Top 10 Wifi Hacking Tools we will be talking about a very popular subject: hacking wireless networks and how to prevent it from being hacked. Wifi is often a vulnerable side of the network when it comes to

fb logo
recover dogecoin from a scam
recover ethereum from a scammer
hire a hacker to hack iphone
hire a hacker to hack snapchat
hire a hacker to hack a windows computer
error: Content is protected !!