Monthly Archives: October 2020

What is Operators in Python , Keyword in Python ?

By | October 29, 2020

In this article, we are telling you about what is operators in Python and Keyword in Python, such as how to use operators in python, how to use Keyword in python, as well as empty in python. Here all this is being told to you practically if you have not read our article about how… Read More »

Basic hacking tools in one tool ?

By | October 27, 2020

In this article, we are telling you about a tool in which you get some basic hacking tools, this tool is very old, but it is still used a lot today, so you are being told about it. You must also have heard about the Gloom Framework tool at some time, you get many basic… Read More »

Local File Inclusion Vulnerability ?

By | October 26, 2020

In this article, we are telling you about Local File Inclusion Vulnerability, we also know it as File Inclusion Vulnerability, here everything is being told practically to you. Here we are telling you about the Local File Inclusion Vulnerability on the live website as well as you are being told this attack on the Xtreme… Read More »

Cross Site Scripting Attacks (Practically) ?

By | October 22, 2020

In this article, we are being told about Cross Site Scripting attacks like Reflected Cross Site Scripting, Stored Base Cross Site Scripting Attacks and DOM Based Cross Site Scripting. We are telling you about the types of Cross Site Scripting Attacks types, how many ways can hackers do this attack or how can they try… Read More »

Missing Functional Level Access Control ?

By | October 20, 2020

In this article, we are telling you about Missing Functional Level Access Control, what is Missing Functional Level Access Control vulnerability, how are hackers taking advantage of this bug. You may have never heard of Missing Functional Level Access Control because mostly you are told about some basic vulnerbiliies like CSRF attack, SQL injection attack… Read More »

What is Server Side Template Injection (SSTI)?

By | October 19, 2020

In this article we are telling you about Server Side Template Injection like what is Server Side Template Injection, how SSTI works and how to find SSTI Vulnerability in websites You might not have heard much of the name of Server Side Template Injection here because it is not much talked about vulnerability but if… Read More »

What is Open Redirect Vulnerability (practical)?

By | October 15, 2020

We are telling you about Open Redirect Vulnerability. It is also called unvalidated redirects and forwards. What is Open Redirect Vulnerability and how it works. You must also have heard about Open Redirect Vulnerability at some point, here is how hackers can take advantage of this Vulnerability, how it is done, all your questions will be… Read More »

Xtreme vulnerable web application (XVWA) ?

By | October 13, 2020

In this article, we are telling you about the Xtreme vulnerable web application. Where you can xvwa download. What is the Xtreme vulnerable web application? How can it help you learn how to hack your website? It will be told to you here. It has been told to you about DVWA and Bwapp earlier also,… Read More »

How to Find Subdomains in Kali Linux ?

By | October 12, 2020

In this article, we are telling you how to find subdomains such as How to Find subdomains as well as what steps do hackers follow before finding hackers subdomain takeover vulnerability. Here we are also telling you about some tools which are used a lot in bug bounty hunting, you can use them if you… Read More »

Website Vulnerability Scanner Kali linux ?

By | October 7, 2020

In this article, we are telling you about Website Vulnerability Scanner Kali linux tools Here we are telling you about three such tools which you can put in the category of Website Vulnerability Scanner Kali linux tools. Here we are telling you about three websites Vulnerability Scanner Kali linux tools practical use, here you can… Read More »