Loading...
This site is best viewed in a modern browser with JavaScript enabled.
Something went wrong while trying to load the full version of this site. Try hard-refreshing this page to fix the error.
Web Security
About Web Application Security & Penetration testing.
Ransomware Attacks: How Digital Forensics Helps Track the Attackers
How Investigators Trace an IP Address in Cybercrime Investigations
From Rejection to RCE: How a Dependency Confusion Finding Came Back Four Months Later and earned $$$
OSINT: How Investigators Gather Intelligence from Public Information
How Hackers Try to Cover Their Tracks - And How Investigators Still Catch Them
How to Write Secure Code: Practical Guide
privilege escalation allow the admin to archive the superadmin
When Apache Becomes the Vulnerability A Close Look at CVE-2021-41773 and Remote Code Execution with CGI
What Really Happens When Ransomware Hits Your System
Privilege Escalation via Unauthorized Impersonation (Admin → Super Admin)
Host Header Injection: The Quiet Vulnerability That Breaks Trust
Privilege Escalation via Response Manipulation
IDOR to Arbitrary File Access – Copy Any User’s Files (Critical)
The Hidden Power of /xmlrpc.php: Why WordPress XML-RPC Still Deserves Your Attention
Broken Link Hijacking: That One Bug Everyone Ignores (Until It Pays)
Breaking File Security: A Directory Traversal Found Through Source Code Review
Top 10 Web Hacking Techniques of 2025||10 تکنیک برتر هک 2025
IDOR – Fixed Terminal Creation in Another Organization
critical idor allow the attacker to add the collabrator in the victim jobs
Critical Idor allow The Attacker To TakeOver All Users Organizations
Next Page »