Home Web Security

Web Security

PHP Vulnerability Hunter

P { margin-bottom: 0.08in; }A:link { } PHP is one of the most famous, open source scripting language that is specially designed for web development. Most...

iRisking Security by Not Securing the Login Forms

Daily we visit many websites for checking our e-mails, shopping, trading etc. How many times do we check for the legitimacy of those websites? Generally, the...

Experts Contemplate If OWASP Top 10 List Should Be Changed Or Not?

Open Web Application Security Project (OWASP) is an organization that grabbed the attention of millions through its incomparable services. It’s a Non Profit Organization...

Sandcat Browser Pen-Tester Browser

Sandcat Browser is a freeware portable pen-test oriented multi-tabbed web browser with extensions support developed by the Syhunt team, the same creators of the...

GameOver Web Security & Hacking

Project GameOver was started with the objective of training and educating newbies about the basics of web security and educate them about the common...

fimap RFI & LFI Scanner – Exploitation

fimap is a little python tool which can find, prepare, audit, exploit and even google automaticly for local and remote file inclusion bugs in...

Web Application Exploiter (WAppEx)

WAppEx is an integrated platform for performing penetration testing and exploiting of web applications on Windows or Linux. It can automatically check for all...

How to Exploit an Iframe Vulnerability & Security

Web application security is always an important topic to discuss because websites seem to be the first target of malicious hackers. Hackers use websites...

Ghost Phisher – Phishing & Penetration Attacks

Ghost Phisher is a computer security application that comes inbuilt with a Fake DNS Server, Fake DHCP Server, Fake HTTP server and also has...

OWASP Top 10 Vulnerabilities & Exploitation

Once upon a time there was no Internet and there was no concept of the Web. But time has passed and today we have...
- Advertisment -

Most Read

OSINT WIFI Tutorial: Track People using WiFi via Wigle

Due to the drastic growth of internet access, Wi-fi networks have become progressively popular. Wi-fi technologies link to the network topologies allows users to...

Why Attack Surface Analysis is a Core of Cybersecurity?

The pandemic of COVID-19 has changed the world dramatically. Almost all everyday actions have gone online: people work from home, students attend lectures through...

The Attack Surface Mapping guide for Ethical Hackers

This article explains how to map the attack surface in a precise and realistic way. An attack surface aims to figure out which areas...

Addressing Myths About Online Casinos & Security

Many people carry a perception that online casinos inherently involve a security risk. The sense is that these sites can be somehow “sketchy” or...