4 min read 0 Uncategorized 2FA simple bypass | Bypass the Two- Two-Factor Authentication Vivek Maurya August 11, 2024
8 min read 0 Uncategorized DOM XSS in document.write sink using source location.search Lab Solved Vivek Maurya January 22, 2024
5 min read 0 Burpsuite Cyber Security Attack Stored XSS into HTML context with nothing encoded lab Solved. Vivek Maurya January 22, 2024
5 min read 0 Burpsuite Cyber Security Attack Reflected XSS into HTML context with nothing encoded Lab solved. Vivek Maurya January 22, 2024
4 min read 0 Cyber Security Attack Burpsuite Username enumeration via different responses Lab Solved Vivek Maurya January 11, 2024
10 min read 0 Computer Network Cloud Computing What is DBMS, Types and its Advantages and Disadvantages? Vivek Maurya December 21, 2023
7 min read 0 Cyber Security Attack Directory traversal attack in Ethical Hacking Full Guide Vivek Maurya October 17, 2023
10 min read 0 Computer Network POP3 Protocol, Pros and Cons in Computer Network Vivek Maurya October 1, 2023