Published inInfoSec Write-upsAdvanced Web Application Security Checklist1. Authentication and Session ManagementSep 2, 20242Sep 2, 20242
# 5 Install OWASP Juice Shop on Kali Linux — Guide for Burp SuiteThis article is a part of the Guide for Burp Suite series. Within the previous article, we see how you can install Burp’s CA (Certificate…Sep 1, 2024Sep 1, 2024
Published inInfoSec Write-ups🛠️ Reconnaissance and Vulnerability Scanning Script🛡️In the fast-paced world of cybersecurity, staying ahead of potential threats requires thorough reconnaissance and vulnerability…Aug 16, 2024Aug 16, 2024
Published inInfoSec Write-ups$600 Simple MFA Bypass — GraphqlWelcome to my blog! In this post, I’ll delve into my recent security testing adventure focusing on multi-factor authentication (MFA)…Mar 1, 20244Mar 1, 20244
Published inInfoSec Write-upsLLM AI Security ChecklistWeb Checklist: https://securitycipher.com/llm-ai-security-checklist/Feb 22, 2024Feb 22, 2024
Published inInfoSec Write-upsDaily Bug Bounty WriteupsCheck out these daily bug bounty write-ups from various sources! They’re a great resource to help you find and address different…Jan 9, 2024Jan 9, 2024
Published inInfoSec Write-upsExploring Application Security with SAST, DAST, SCA, and IASTWelcome to today’s blog, where we’ll explore the world of software security testing. In an era where cyber threats are on the rise, it’s…Jan 4, 20241Jan 4, 20241
Top Burp Suite Extensions Used by Penetration TestersBurp Suite is a powerful tool for web application security testing. One of the key features of Burp Suite is its ability to extend its…Dec 18, 20231Dec 18, 20231
Published inInfoSec Write-upsAll about Ethical HackingThis article seeks to serve as a thorough introduction to Ethical Hacking. Ethical hacking refers to the practice of using computer…Dec 14, 2023Dec 14, 2023
I will do Vulnerability Assessment and penetration testing on your websiteServices:Dec 12, 2023Dec 12, 2023