Published inInfoSec Write-upsAdvanced Web Application Security Checklist1. Authentication and Session ManagementSep 22Sep 22
# 5 Install OWASP Juice Shop on Kali Linux — Guide for Burp SuiteThis article is a part of the Guide for Burp Suite series. Within the previous article, we see how you can install Burp’s CA (Certificate…Sep 1Sep 1
Published inInfoSec Write-ups🛠️ Reconnaissance and Vulnerability Scanning Script🛡️In the fast-paced world of cybersecurity, staying ahead of potential threats requires thorough reconnaissance and vulnerability…Aug 16Aug 16
Published inInfoSec Write-ups$600 Simple MFA Bypass — GraphqlWelcome to my blog! In this post, I’ll delve into my recent security testing adventure focusing on multi-factor authentication (MFA)…Mar 14Mar 14
Published inInfoSec Write-upsLLM AI Security ChecklistWeb Checklist: https://securitycipher.com/llm-ai-security-checklist/Feb 22Feb 22
Published inInfoSec Write-upsDaily Bug Bounty WriteupsCheck out these daily bug bounty write-ups from various sources! They’re a great resource to help you find and address different…Jan 9Jan 9
Published inInfoSec Write-upsExploring Application Security with SAST, DAST, SCA, and IASTWelcome to today’s blog, where we’ll explore the world of software security testing. In an era where cyber threats are on the rise, it’s…Jan 41Jan 41
Top Burp Suite Extensions Used by Penetration TestersBurp Suite is a powerful tool for web application security testing. One of the key features of Burp Suite is its ability to extend its…Dec 18, 20231Dec 18, 20231
Published inInfoSec Write-upsAll about Ethical HackingThis article seeks to serve as a thorough introduction to Ethical Hacking. Ethical hacking refers to the practice of using computer…Dec 14, 2023Dec 14, 2023
I will do Vulnerability Assessment and penetration testing on your websiteServices:Dec 12, 2023Dec 12, 2023