Since the launch in 2010, there are multiple Cloudflare reviews. Over the years they have introduced new features however many of the reviews were not updated. So the aim of this post is to (hopefully) provide you with the latest information about Cloudflare. However, do note that the post will be written from the point
With the rising popularity of bug bounties, I’ve decided to find some bugs online myself. You would be amazed by how vulnerable websites are and how easy it is to find an XSS vulnerability. Try using a simple Google dork like inurl:”.php?id=” and you could definitely find a couple of sites that are vulnerable to XSS.
Cybersecurity is a very broad term. I feel that techtarget.com does an excellent job in describing what cybersecurity is all about. Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security.
Ever wanted to run a script with the terminal closed? Or do you want to maximize the usage of a terminal? In this tutorial, you can achieve both results with the help of tmux. This tutorial together with the tmux cheat sheet at the end of this tutorial will help you achieve the both scenarios
Introduction & Pre-requisite sqlmap is an automated penetration testing tool for SQL Injection OWASP-2013-A1. In this tutorial, you will learn more about the different types of sqlmap commands and switches. First of all, downloading and installing of sqlmap is straightforward. If you are using Kali Linux or any other popular Linux distribution, Git is already pre-installed.