1011100100101101010100100001
00100011101011111110101
111111001101010111111000
100010101000000101100100
Cybersecurity engineer, pentester and CTF enthusiast
HTTP, we often hear this acronym; it enables the web to function, but how does it really work? Let's find out!
How can an attacker bypass a WAF or firewall and access information that is supposed to be protected?
Delve into the Dark Depths of SQL Injection: When Data Becomes Weapons
Let me vulgarize one of the most seen web vulnerability, Cross Site Scripting also known as XSS