Blog

How to use SQLMap

SQLMap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection vulnerabilities. It can

Blog

SQL Injection

SQL Injection (SQLi) is a security vulnerability that occurs when an attacker can manipulate SQL queries executed by a database.

Blog

Cross-Site Scripting

Cross-Site Scripting (XSS) is a common security vulnerability that occurs when an attacker injects malicious scripts into a trusted website.

Blog

Path Traversal

Path traversal, also known as directory traversal, is a vulnerability that occurs when an application improperly restricts user input, allowing

Blog

HTML Injection

HTML Injection is a type of security vulnerability where an attacker is able to inject malicious HTML code into a

Blog

Nuclei in bug bounty

Using Nuclei in bug bounty hunting can be highly effective for automated vulnerability scanning and reconnaissance. Nuclei is a powerful

Blog

Subdomain Enumeration

Subdomain enumeration is a critical step in the reconnaissance phase of bug bounty hunting. It involves identifying all the subdomains

Scroll to Top