Bibek Thapa MagarinSystem WeaknessAttack Types In Intruder (Burpsuite)It has been a while since I’ve published any articles. Today I would like to write on the attack types used in intruder. I’m skipping all…Sep 6, 2022Sep 6, 2022
Bibek Thapa MagarWhat are the differences between GET and POST methods ?The more compact and summarized differences cab be seen on the picture.Jun 26, 2021Jun 26, 2021
Bibek Thapa MagarWhat is Red Teaming?The internet has become an integral part of today’s world.Computers and electronics equipment are increasing at a very fast rate connecting…Jun 5, 2021Jun 5, 2021
Bibek Thapa MagarinCryptoGen NepalWhat is a CSV injection attack?What are CSV files?Mar 25, 2021Mar 25, 2021