Chat GPT: The Future of Conversational AI

In recent years, conversational AI has become increasingly prevalent, with chatbots and virtual ass…

Cybersecurity: Protecting Yourself and Your Data Online

Introduction: As we spend more and more time online, the threat of cyber attacks becomes increasingl…

How to fix SSRF Vulnerability?

Server-Side Request Forgery (SSRF) is a type of security vulnerability that allows an attacker to s…

XSS Bypass Closing Tag ">" Filtered

This time I try to continue the previous findings with some of my opinion and reference findings 🙂 …

Blind XSS using XSS Hunter

What is XSS Hunter? XSS Hunter is a free service provided by @IAmMandatory with the aim of making it…

What Are Bug Bounties & How Do They Work?

Bug bounty is a program created by companies or developers to give appreciation in the form of mone…

What is Linux ?

What is Linux ? Linux is a type of operating system (OS) that is both open source and free. One of …

What is SQL Injection?

SQL Injection (SQLi) is a type of an injection attack that makes it possible to execute malicious S…

Cross Site Scripting (XSS)

What is Cross-site Scripting (XSS) Cross-site scripting (XSS) is a type of security vulnerability th…