XAMPP Control Panel | Your Home Web Server
What is XAMPP? XAMPP, an acronym for Cross-Platform, Apache, MySQL, PHP, and Perl, is a freely available and open-source web…
The ELK Stack: Free open-source SIEM solution
What is ELK? The ELK stack is an open-source software collection that provides a powerful and versatile toolset for log…
Main Types of Authorization
What is Authorization? Authorization is the process of determining what resources a user or process can access. It is an…
Sniffnet – Network Monitoring
What is Sniffnet? Sniffnet is a free and open-source application for Linux, macOS, and Windows. It is a network monitoring…
How do Hackers Bypass Antivirus Protection?
Alert This is article only for educational purposes! × Dismiss this alert. What is Merlin? Merlin is an HTTP/2 Command…
Shodan.io: The Search Engine for the Internet of Things
What is Shodan.io? Shodan.io is a search engine for internet-connected devices. It is also known as the “search engine for…
Secure and Insecure Cryptographic Algorithms
What are Cryptographic Algorithms? Cryptographic algorithms are mathematical procedures used to perform cryptographic operations, such as encryption, decryption, and digital…
5 Best Scanners for Penetration Testing
1. Nmap Nmap is a free and open-source network scanner that can be used for a variety of purposes, including:…
Fuzzing | Introduction to Software Testing
What is Fuzzing? Fuzzing, or fuzz testing, is a software testing technique that provides invalid, unexpected, or random data as…
Exploiting XSS in hidden input fields and meta tags
In this post we are going to show how you can (ab)use the new HTML popup functionality in Chrome to…