Published inSystem WeaknessAttack Types In Intruder (Burpsuite)It has been a while since I’ve published any articles. Today I would like to write on the attack types used in intruder. I’m skipping all…Sep 6, 2022Sep 6, 2022
What are the differences between GET and POST methods ?The more compact and summarized differences cab be seen on the picture.Jun 26, 2021Jun 26, 2021
What is Red Teaming?The internet has become an integral part of today’s world.Computers and electronics equipment are increasing at a very fast rate connecting…Jun 5, 2021Jun 5, 2021
Published inCryptoGen NepalWhat is a CSV injection attack?What are CSV files?Mar 25, 2021Mar 25, 2021