Cyberchef is a must-have security tool.
If you’re seriously involved in cybersecurity or digital forensics, you’ve likely encountered a variety of appropriate tools designed to address common challenges within these fields. These tools are essential for threat detection, incident response, data recovery, and investigative analysis. They provide professionals with the resources to protect systems and recover...
Read MoreSSRF with filter bypass via open redirection vulnerability
Server-side request Forgery allows an attacker to bypass network access control and make requests to servers located on the private network that are not reachable from the Internet. These techniques exploit the trust between servers or applications owned by the same entity to inject requests through the user interface, making...
Read MoreSQL Injection
How to detect and exploit SQL Injection vulnerabilities. Structured Query Language (SQL) Injection, or SQLi, is a web security vulnerability that allows an attacker to interfere with queries an application performs to its database. This method will allow attackers to view data that is typically not accessible. This data may...
Read MoreIDORs: What are they and how to find them
How to find and exploit IDOR vulnerabilities in a web application giving you access to data you shouldn’t have.
Read More