
How to Exploit Android Activities?
This blog will explore different methods and techniques to exploit Android activities with the “exported=true” attribute set. By understanding the vulnerabilities associated with this attribute,

This blog will explore different methods and techniques to exploit Android activities with the “exported=true” attribute set. By understanding the vulnerabilities associated with this attribute,

In the vast, interconnected realm of the internet, security threats are as diverse and complex as the web itself. One such threat, often overlooked yet

In the complex world of Android app security, intent injection vulnerabilities pose a significant threat. These vulnerabilities allow attackers to manipulate the communication between different

As the digital landscape continues to evolve, so do the threats that target web applications. Cross-site scripting (XSS) remains a persistent and dangerous vulnerability among

In web security, CRLF Injection Attacks remain a potent threat. This blog aims to provide comprehensive insight into this malicious technique, its implications, and the

In this blog post, we will explore the concept of container capabilities in Docker and delve into the potential risks associated with excessive privileges. We’ll

Burp Suite, developed by PortSwigger, is a powerful web application security testing tool widely used by security professionals and penetration testers. It offers a comprehensive

What is MySQL? MySQL is a powerful, free, open-source database management system widely used in web applications. It uses the popular Structured Query Language (SQL)

Web applications are essential to our daily lives but pose a significant security risk. Cybercriminals are always looking for ways to exploit vulnerabilities in web

In Part 2 of the Hacking GraphQL series, we discussed the GraphQL DoS attack. In Part 3, we’re going to try to exploit the SQLi

SSRF vulnerabilities allow an attacker to send crafted malicious requests from the back-end server of a vulnerable application. Criminals usually operate SSRF attacks to target

In part 1 of the Hacking GraphQL series, we discussed about the basics of GraphQL. In part 2 of this series, we’re going to try