Blog

Home / Blog

Wifi Hacking (Pt.1)

Wifi Hacking (Pt.1)

Wi-Fi stands for wireless network technology. It establishes wireless network connections using radio waves. Malicious hackers frequently opt to penetrate firms by compromising their Wi-Fi

Read More »
Server-Side Request Forgery

Server-Side Request Forgery

SSRF vulnerabilities allow an attacker to send crafted malicious requests from the back-end server of a vulnerable application. Criminals usually operate SSRF attacks to target

Read More »
no sql injection

No SQL Injection

NoSQL Injection refers to cyber-attacks that inject malicious payloads into non-SQL databases like MongoDB. Due to the new demand for modern-day applications, there has been

Read More »
Antivirus Evasion (Part 1)

Antivirus Evasion (Part 1)

Antivirus Evasion in general use signature-based and heuristics-based malware detection mechanisms. In this blog, we will learn and test some techniques to try and bypass

Read More »
Hacking GraphQL Part 1

Hacking GraphQL Part 1

GraphQL is quickly becoming the alternative to REST API, being able to request a specified set of data across multiple resources within a single request.

Read More »