Be Practical
  • Web development
    • Articles
    • Web Templates
    • Frontend Challenges
  • Cyber Security
    • Articles
    • Labs
    • CSRF PoC Generator
  • Services
    • Web Development
  • How to
  • Subscribe
Cyber Security
March 23, 2023

The Art of using Google Dorks

Google dorks are Used by Hackers to find the Sensitive information like Emails, Usernames, Passwordsand some to…

Kancha Ganesh 0
35
Web development
March 20, 2023

Javascript array methods map, filter, reduce simplified!

Hola! In this article we are going to learn about some famous javascript array methods . Each…

Janhvi Singh 0
19
Web development
March 19, 2023

Hoisting in JavaScript (A practical way)

Hoisting is a behavior in JavaScript where variable and function declarations are moved to the top of…

Janhvi Singh 0
14
Cyber Security
March 17, 2023

Web Cache Poisoning: The Silent but Deadly Threat to Web Applications

Introduction Web cache poisoning is a technique used by attackers to compromise a web application’s cache in…

Kunal Dhumal 0
33
Cyber Security
March 17, 2023

Hacking with Google Developer Tools

An Ethical hackers and Hackers exploit the bugs using the Google developers tools. The most of the…

Kancha Ganesh 0
55
Cyber SecurityHow to
March 12, 2023

How do we enumerate root domains using amass?

Hello everyone, in this article, we will learn how to enumerate root domains using amass. If you…

Asif Pathan 0
47
Cyber Security
March 7, 2023

Updating User’s Information via XXE

Introduction: XXE (XML External Entity) is a type of vulnerability in web applications that use XML parsers….

Kunal Dhumal 0
31
Cyber Security
February 28, 2023

The Art of Brute Forcing Subdomains

In this article we will be covering the topic, “Brute Forcing Subdomains” by telling you about it…

Naveen Reddy 0
114
Cyber Security
February 26, 2023

Exploring the Dangers of NoSQL Injection

NoSQL databases, such as MongoDB and Cassandra, have become increasingly popular in recent years due to their…

Kunal Dhumal 0
90
Cyber SecurityHow to
February 24, 2023

WordPress users names Disclosure

Hello everyone, in this article we are going to see a vulnerability called WordPress Usernames disclosure. Before,…

Asif Pathan 0
61
Page 1 of 11 Next

Recent posts

March 23, 2023

The Art of using Google Dorks

March 20, 2023

Javascript array methods map, filter, reduce simplified!

March 19, 2023

Hoisting in JavaScript (A practical way)

Tag Cloud

Cyber Security (67) How to (23) Others (9) Web development (26)

Tag Cloud

Cyber Security How to Others Web development

Categories

  • Cyber Security 67
  • How to 23
  • Others 9
  • Web development 26

Advertising

Be Practical

Published with ❤️

  • Sign in

Forgot your password?

Lost your password? Please enter your email address. You will receive mail with link to set new password.

Back to login