Bibek Thapa MagarWhat are Indicators of Compromise?Indicators of Compromise:3 min read·Sep 6, 2022----
Bibek Thapa MagarinSystem WeaknessAttack Types In Intruder (Burpsuite)It has been a while since I’ve published any articles. Today I would like to write on the attack types used in intruder. I’m skipping all…4 min read·Sep 6, 2022----
Bibek Thapa MagarWhat are the differences between GET and POST methods ?The more compact and summarized differences cab be seen on the picture.2 min read·Jun 26, 2021----
Bibek Thapa MagarWhat is Red Teaming?The internet has become an integral part of today’s world.Computers and electronics equipment are increasing at a very fast rate connecting…7 min read·Jun 5, 2021----
Bibek Thapa MagarinCryptoGen NepalWhat is a CSV injection attack?What are CSV files?4 min read·Mar 25, 2021----