Essential Tools Used in Web Penetration Testing

In the world of cybersecurity, web penetration testing plays a crucial role in identifying vulnerab…

OWASP Top 10 Vulnerabilities in Web Applications

The OWASP Top 10 is a widely recognized list of the most critical web application security vulnerab…

HackerOne: Empowering Ethical Hacking and Bug Bounty Programs

The rapid pace of technological innovation in today's world has brought with it an ever-increas…

How to fix SSRF Vulnerability?

Server-Side Request Forgery (SSRF) is a type of security vulnerability that allows an attacker to s…

XSS Bypass Closing Tag ">" Filtered

This time I try to continue the previous findings with some of my opinion and reference findings 🙂 …

Blind XSS using XSS Hunter

What is XSS Hunter? XSS Hunter is a free service provided by @IAmMandatory with the aim of making it…

What Are Bug Bounties & How Do They Work?

Bug bounty is a program created by companies or developers to give appreciation in the form of mone…