Hello everyone, Hope everyone is having good day. Today we are going learn about subdomain takeover vulnerability which is a good vulnerability but little bit…
subdomain-takeover-cover-image
Hello everyone, in this article we will see what a VHOST is, the uses of using VHOST, and the enumeration techniques to find VHOST. Now,…
vhost-enumeration-cover-image
Hello everyone, in today‚Äôs article we are going to discuss about Bash scripting. Bash scripting is kind a programming language which is often used in…
bash-scripting
Introduction: In the rapidly evolving landscape of cybersecurity, new tools and techniques continually emerge, shaping the way we understand and defend against digital threats. One…
Hello everyone, in this article I am going to tell you the easiest methods to install Parrot OS into your system. If you want to…
Introduction In today’s interconnected digital world, data breaches and cyber-attacks have become an unfortunate reality. One such prevalent attack vector is the SQL injection attack.…
what is sql injection attack with example