Hello World!
Unlocking The Secrets Of Digital Safety
Welcome to my cyberspace. Here, you will find comprehensive IT projects, security research, write-ups for CTF challenges, stories on bug hunting, and notes that might help others.
Server-side request Forgery allows an attacker to bypass network access control and make requests to servers located on the private...
How to detect and exploit SQL Injection vulnerabilities. Structured Query Language (SQL) Injection, or SQLi, is a web security vulnerability...
Hey there! Suppose you have downloaded a .jpeg image from the World Wide Web and suspect something is hidden inside it...
Encoding and encryption are used interchangeably. Encryption involves encoding data for confidentiality and security, while encoded data is not necessarily...
Threat actors Threat actors use viruses, worms, and Trojan horses to carry their payloads for other malicious reasons. The most prevalent malware...
Cyber security is ever-changing, and choosing the best OS with the right toolkit is crucial for ethical hackers and security...