fbpx
Home Web Security

Web Security

PHP Vulnerability Hunter

P { margin-bottom: 0.08in; }A:link { } PHP is one of the most famous, open source scripting language that is specially designed for web development. Most...

iRisking Security by Not Securing the Login Forms

Daily we visit many websites for checking our e-mails, shopping, trading etc. How many times do we check for the legitimacy of those websites? Generally, the...

Experts Contemplate If OWASP Top 10 List Should Be Changed Or Not?

Open Web Application Security Project (OWASP) is an organization that grabbed the attention of millions through its incomparable services. It’s a Non Profit Organization...

Sandcat Browser Pen-Tester Browser

Sandcat Browser is a freeware portable pen-test oriented multi-tabbed web browser with extensions support developed by the Syhunt team, the same creators of the...

GameOver Web Security & Hacking

Project GameOver was started with the objective of training and educating newbies about the basics of web security and educate them about the common...

fimap RFI & LFI Scanner – Exploitation

fimap is a little python tool which can find, prepare, audit, exploit and even google automaticly for local and remote file inclusion bugs in...

Web Application Exploiter (WAppEx)

WAppEx is an integrated platform for performing penetration testing and exploiting of web applications on Windows or Linux. It can automatically check for all...

How to Exploit an Iframe Vulnerability & Security

Web application security is always an important topic to discuss because websites seem to be the first target of malicious hackers. Hackers use websites...

Ghost Phisher – Phishing & Penetration Attacks

Ghost Phisher is a computer security application that comes inbuilt with a Fake DNS Server, Fake DHCP Server, Fake HTTP server and also has...

OWASP Top 10 Vulnerabilities & Exploitation

Once upon a time there was no Internet and there was no concept of the Web. But time has passed and today we have...
- Advertisment -

Most Read

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...