Blog

Here you can find articles we have written

All Posts

person holding red apple fruit
1
Jun
security

Breaking Down SQL Injection: Unveiling the Attack Types

SQL injection is a common and serious web vulnerability. Learn the types of SQL injection attacks, such as in-band, blind, and out-of-band. See how attackers exploit SQL statements to access or damage databases. Read this article now and learn how to secure your web applications from SQL injection!

Read more ...

black and white dolphin in water
31
May
linux

Dive into SQL: Exploring the Foundations

Find out how to use SQL statements to create, insert, update, delete, and select data. See how SQL can be exploited by adversaries to perform SQL injection attacks. Read this article now and master the fundamentals of SQL and database security

Read more ...

a magnifying glass sitting on top of a piece of paper
27
May
security

Ensuring Trust: The Role of Certificate Transparency

Learn how Certificate Transparency (CT) enhances the security and trust of SSL/TLS certificates by logging, monitoring, and auditing them. Discover why CT is essential for preventing fraudulent certificates and protecting online communication. Read on to find out more about the components and benefits of CT

Read more ...

white and black outdoor camera
27
May
ethical hacking

Leveraging Certificate Transparency for Domain Gathering

Learn how CT logs and monitoring reveal domains, organizations, and systems. Use crt.sh and other tools for CT-based recon. See why CT is a double-edged sword and how to protect your assets. Click now to learn!

Read more ...

white clouds under blue sky during daytime
21
May
ethical hacking

Fuzzing the Right Way: Maximizing Results with ffuf

Learn fuzzing, a technique to test web applications with invalid data. Find out how to use ffuf, a fast fuzzing tool, with different wordlists, modes, requests, and filters. Master fuzzing with ffuf and boost your web security skills now!

Read more ...

person holding magnifying glass
21
May
ethical hacking

Unveiling Secrets with Content Discovery

Learn content discovery, a skill to find hidden and sensitive information on websites. Discover how to do it manually, with OSINT, or with automated tools. Identify the framework, technology, and firewall of a website. Boost your cyber security knowledge with content discovery today!

Read more ...

selective focus photography of brown spider in the ground
19
May
security

Exploring Exploit Possibilities with SearchSploit

SearchSploit helps you find and exploit vulnerabilities offline or online. Learn how to use its features and access its database in this article. Boost your security skills with SearchSploit today!

Read more ...

black and white round textile
12
May
security

Digital Forensics 101: Understanding the Basics of Investigating Cyber Crimes

Digital forensics is the process of collecting and protecting digital evidence from cybercrimes. Learn what digital forensics is, how it works, and what tools and techniques are used to perform it. Click to learn more.

Read more ...

brown metal shield
11
May
ethical hacking

Metasploit: Upgrade Shell to Meterpreter

Learn how to upgrade from a basic shell to Meterpreter, an advanced payload that gives you more control over the target system. Don't miss it if you want to master Meterpreter and enhance your cyber securtiy skills. Click to read more.

Read more ...

a wall covered in lots of graffiti and stickers
7
May
ethical hacking

Metasploit 101: A Basic Tutorial for Penetration Testing

Learn to exploit web apps and systems with Metasploit Framework. Follow the tutorial of attacking a Linux machine with Metasploit. Master Metasploit and boost your pentesting skills. Click to read more!

Read more ...

smoking factory during daytime
3
May
ethical hacking

Prototype Pollution: How Hackers Can Exploit It to Attack Your Website

Learn what prototype pollution is, how it works, and how to exploit it in different web applications. See the real-world examples of prototype pollution exploitation and the tools and techniques used by hackers. Don't miss this article if you want to master prototype pollution attacks and secure your web apps. Click to read more!

Read more ...

blue elephant figurine on macbook pro
29
Apr
ethical hacking

Exploiting Insecure Deserialization Vulnerability

Exploit deserialization vulnerabilities in Java, PHP and Ruby web apps. See how attackers execute code on the target. Click here and learn how to secure your web apps from deserialization attacks.

Read more ...