10 Open Source Lightweight Web Browsers for Linux

There are plenty of web browsers available for Linux. A lot of them are based on Chromium but we also have a list of browsers that are not based on Chromium. Recently, a reader asked for a lightweight web browsers

The Dark Web And How To Access It

Contents What’s the dark web How to access the dark web Installation of TOR browser – Windows and Kali Finding onion websites Dark Web What is the dark web In short, dark web is part of the web which requires

Use Python To Detect And Bypass Web Application Firewall

Web application firewalls are usually placed in front of the web server to filter the malicious traffic coming towards server. If you are hired as a penetration tester for some company and they forgot to tell you that they are

RecoX: Scripts For Web Application Reconnaissance

(Last Updated On: October 26, 2020) RecoX, an open source software a collection of master scripts for Web Application Scanning. The script aims to help in classifying vulnerabilities in web applications. The methodology RecoX is arising can spot weaknesses other than

Web Application Penetration Testing Checklist

Web Application Pentesting is a method of identifying, analyzing and Report the vulnerabilities which are existing in the Web application including buffer overflow, input validation, code Execution, Bypass Authentication, SQL Injection, CSRF, Cross-site scripting in the target web Application which

Set up your own web application pentesting lab

Without any preface, let me get straight to the point. In this tutorial, we will be installing Damn Vulnerable Web Application (DVWA) on a Ubuntu virtual machine. Our attacker machine would be Kali Linux, which is also installed as a virtual

Configure your web application pentesting lab

In the previous tutorial, we set up our web application pentesting lab. However, it’s far from ready, and we need to make some changes to get it working as per our needs. Here’s the link to the previous post if

fb logo
recover dogecoin from a scam
recover ethereum from a scammer
hire a hacker to hack iphone
hire a hacker to hack snapchat
hire a hacker to hack a windows computer
error: Content is protected !!