DNS Rebinding
DNS rebinding is a technique used by attackers to gain unauthorized access to a target device or network by manipulating
Think Like an Attacker. Secure Like a Pro. Where Curiosity Meets Cybersecurity. Ethical hacking, OSINT, bug bounty, and cybersecurity guides built on real-world experience.
DNS rebinding is a technique used by attackers to gain unauthorized access to a target device or network by manipulating
Command injection is a type of security vulnerability that occurs when an attacker is able to execute arbitrary commands on
CSV Injection, also known as formula injection, occurs when a malicious actor is able to inject a formula or malicious
A fork bomb is a type of malware that can cause a computer to crash by using up all of
Keyloggers are programs or hardware devices that track a keyboard’s activities (keys pressed). Keyloggers are spyware where users are unaware
Cross-site request forgery (CSRF), also known as XSRF, Sea Surf or Session Riding, is an attack vector that tricks a
CRLF – Carriage Return Line Feed When a browser sends a request to a web server, the web server answers
Argument injection is a type of attack based on tampering with the input parameters of a page. This can enable attackers
Account takeover attacks are on the rise, with an estimated 25% of adults in the world falling victim to this
The WebSocket API is an advanced technology that makes it possible to open a two-way interactive communication session between the
A reverse shell is a type of session cyber attackers commonly use to open communication ports between their machines and the victims