./Fingerprinting Web TechnologiesLet's check this in a short and simple way, the web fingerprinting under scrutiny includes more than just the online surfing program, such…Aug 30Aug 30
./ Broken Access Control (BAC) | Detection!// How can we detect a broken access control?Jul 21, 2023Jul 21, 2023
./ Broken Access Control (BAC)What is Broken access control? | // Detection! // Exploitation! // Prevention!Jul 7, 2023Jul 7, 2023
./Malicious DocumentAttacking with malware through malicious documents is not new but considering how malware attacker use different techniques has become…Jan 8, 20231Jan 8, 20231