Author: KRiPPto99
Introduction: “Hello and welcome to this tutorial on how to create your own XSS scanner using Python! My name is…
Intruduction Hello!!!!!!!!!!!!!!!!!! everyone! It’s KRiPPto99 Back again I hope you all doing very well. Today in the blog we are going to…
What is an HTTP Host header The HTTP host header is an request header that specifies the domain which a…
Finding hidden Parameters for bug bounty Well!!! Hello everyone! It’s KRiPPto99 Back again I hope you all doing very well.…
HEY Guys, Its KRiPPto99 Back again. In today’s blog We are going to see web cache poisoning attack, what is…
Hey Guys, Its KRiPPto99 Back again. In today’s blog I’m going to show you Top 10 Bug Bounty reports But At…
Pause desync attack: access to 403 forbidden and admin panel These attack is part of HTTP REQUEST SMUGGLING. Hey lovely…
Hey Guys, Its KRiPPto99 Back again. In today’s blog I’m going to show you How can anyone bypass OTP and…
This Blog is written for to know the system hacking works, i am explaining how to hack system using Metaspolit,…
what are the phases of ethical hacking before beginning lets know what is system hacking so any device which is…
What are internet ports In pc networking, a port may be a variety assigned to uniquely determine a association…
What is IDOR Insecure direct object reference is type of access control vulnerability in digital security. this can occur when…