Latest Blog Post


No Image

2FA simple bypass | Bypass the Two-...

What is Two-Factor Authentication? Two-Factor Authentication (2FA...

No Image

DOM XSS in document.write sink usin...

Introduction So, as from the title we can easily know that the la...

No Image

Stored XSS into HTML context with n...

Introduction So, as from the title we can easily know that the la...

No Image

Reflected XSS into HTML context wit...

Introduction So, as from the title we can easily know that the la...

username_enumeration_vulnerability

Username enumeration via different ...

Introduction So, this lab is totally based on Authentication. Let...

No Image

What is DBMS, Types and its Advanta...

To start with the DBMS, we have to know what is Database? Introdu...

Global Post


No Image
2FA simple bypass | Bypass the...

What is Two-Factor Authentication? Two-Factor Authentication (2FA) is a security…

No Image
DOM XSS in document.write sink...

Introduction So, as from the title we can easily know…

No Image
Stored XSS into HTML context w...

Introduction So, as from the title we can easily know…

No Image
Reflected XSS into HTML contex...

Introduction So, as from the title we can easily know…

username_enumeration_vulnerability
Username enumeration via diffe...

Introduction So, this lab is totally based on Authentication. Let’s,…

Weekend Top