Month: February 2021

Use of Active Scan++ in Burp Suite?

In this article ,We are telling you about active scan++ like how to use active scan++ in burp suite. You must have heard about your active scan++, you are being told about this extension by practically using it. We will be told…Read More »

Share This:

How to Find Hidden Parameters ?

In this article, we are telling you about how to find hidden parameters, just as we have previously told you about how to find hidden directories, similar hidden parameters are also there. Here we are telling you about practical to find hidden…Read More »

Share This:

Clickjacking and Phishing for Facebook Hacking ?

In this article, we are telling you that how hackers can use Clickjacking and Phishing attack together and hack someone’s facebook account, all this is being told to you for educational purpose. We have already told you a lot about clickjacking vulnerability…Read More »

Share This:

Server Side Template Injection Payloads ?

In this article, we are telling you about Server Side Template Injection Payloads like how Server Side Template Injection Payloads are injected into a website. We have already told you about Server Side Template Injection, if you have not read that article…Read More »

Share This:

How to Bypass 403 Forbidden ?

In this article, we are telling you about the How to Bypass 403 Forbidden error, you must have heard about Bypass 403 Forbidden before but very few people know in detail. Here we are telling you about the Bypass 403 Forbidden both…Read More »

Share This:

What is File Upload Vulnerability ?

In this article, we are telling you about file upload vulnerability and How to find File Upload Vulnerability in a website. How to do this attack automatically. We have already told you about the file path traversal attack, but the file upload…Read More »

Share This:

How to Bypass Cloudfare ?

In this article, we are telling you about how to bypass cloudfare. you must have also noticed many times when you bug bounty, in which case you need to bypass cloudfare. Here we are telling you how hackers bypass Cloudfare or how…Read More »

Share This:

Cross-Site Request Forgery Attack ?

In this article, we are telling you about the Cross-Site Request Forgery attack. We have already told you about the Cross-Site Request Forgery attack. You can also read our article if you want. Here we are telling you how to do Cross-Site…Read More »

Share This:

What is Json Vulnerabilities OWASP ?

In this article, we are telling you about json vulnerability owasp, you may have never heard of json vulnerabilities owasp because very few people know about it. This is because there is not much talk about json vulnerabilities owasp and it is…Read More »

Share This: