Monthly Archives: February 2021

Use of Active Scan++ in Burp Suite?

By | February 28, 2021

In this article ,We are telling you about active scan++ like how to use active scan++ in burp suite. You must have heard about your active scan++, you are being told about this extension by practically using it. We will be told you how active scan++ is useful for you, you can easily find bugs… Read More »

How to Find Hidden Parameters ?

By | February 26, 2021

In this article, we are telling you about how to find hidden parameters, just as we have previously told you about how to find hidden directories, similar hidden parameters are also there. Here we are telling you about practical to find hidden parameters, to find hidden parameters, you should also know what are the parameters… Read More »

Clickjacking and Phishing for Facebook Hacking ?

By | February 20, 2021

In this article, we are telling you that how hackers can use Clickjacking and Phishing attack together and hack someone’s facebook account, all this is being told to you for educational purpose. We have already told you a lot about clickjacking vulnerability and phishing attack, and most of all know about phishing attack, if you… Read More »

Server Side Template Injection Payloads ?

By | February 17, 2021

In this article, we are telling you about Server Side Template Injection Payloads like how Server Side Template Injection Payloads are injected into a website. We have already told you about Server Side Template Injection, if you have not read that article of ours, then you must read it first, then only you can understand… Read More »

How to Bypass 403 Forbidden ?

By | February 15, 2021

In this article, we are telling you about the How to Bypass 403 Forbidden error, you must have heard about 403 forbidden bypass before but very few people know in detail. Here we are telling you about the Bypass 403 Forbidden both theory and practical. You must have seen this many times while visiting some… Read More »

What is File Upload Vulnerability ?

By | February 13, 2021

In this article, we are telling you about file upload vulnerability and How to find File Upload Vulnerability in a website. How to do this attack automatically. We have already told you about the file path traversal attack, but the file upload vulnerability is different, here we are also telling you how you can find… Read More »

How to Bypass Cloudfare ?

By | February 8, 2021

In this article, we are telling you about how to bypass cloudfare. you must have also noticed many times when you bug bounty, in which case you need to bypass cloudfare. Here we are telling you how hackers bypass Cloudfare or how you can bypass Cloudfare while bug bounty so that you can do bug… Read More »

Cross-Site Request Forgery Attack ?

By | February 5, 2021

In this article, we are telling you about the Cross-Site Request Forgery attack. We have already told you about the Cross-Site Request Forgery attack. You can also read our article if you want. Here we are telling you how to do Cross-Site Request Forgery attack using different methods, here we are telling you by solving… Read More »

What is Json Vulnerabilities OWASP ?

By | February 3, 2021

In this article, we are telling you about json vulnerability owasp, you may have never heard of json vulnerabilities owasp because very few people know about it. This is because there is not much talk about json vulnerabilities owasp and it is very rare that there is not much information about this bug in some… Read More »