Hi, I hope you’re doing well. In this article I am going to illustrate few different type of CSRF attacks. To start with, A CSRF …
Read moreHi, I hope you’re doing well. In this article I am going to illustrate few different type of CSRF attacks. To start with, A CSRF …
Read moreBasically, the break through is pretty simple. We need to upload the txt file with HTML contents and the tmp.txt will act as a HT…
Read moreThis article is for newbies like me whom are interested in building their own automation process in bug bounty. If you're a P…
Read moreAssalamualaikum, This write-up is about bypassing Cloudflare and getting origin servers. Description: Cloudflare is a secur…
Read moreAssalamualaikum, Ramdaan Mubarak Everyone. This write up is about getting more juicy staffs of a target via SHODAN Usually we…
Read more