What is HTTP request smuggling. ? HTTP request smuggling is a technique that, allowing an attacker to...
Blog
The Windows Subsystem for Linux (WSL) is a feature of windows operating system by which you can...
Android Nougat and above version is no longer trusts user supplied CA certificates. Then we need to...
As we all Know the Microsoft has recently announced the windows next generation i.e. Windows 11 with...
3uTool is the all-in-one tool for iOS devices, we can jailbreak the device directly from 3utools, or...
Mostly Many developers while writing the code. They forgot to add regex for special characters/symbols which can...
The below are some common checklist for web application penetration testing. Information Gathering Spiders, Robots, and Crawlers...
Why penetration testing required? Mobile applications often process any sensitive data (like user details, accessing contacts, photos,...
Below are the list of commands:- Commands Command usages and details $apropos Search Help manual pages...
Step 1:- Enable AllowOverride mode in config file. After successfully install the apache server open configuration file....
In this post, we will show you the basic steps of the root detection bypass method along...