Working in cyber security field form past 3 years. I am bug hunter and CTF Player. I love to write blogs and write ups about my CTF solutions and bug bounty journey.
Ethical hacking, bug Hunting, web development, web application pentesting
| Title | Updated | Status |
|---|---|---|
| Vulnerabilities in Tor | Is the Tor Browser Safe? | March 19, 2024, 11:42 p.m. | Published |
| How are TOR Onion Hidden Addresses Created | How Does it Work? | March 19, 2024, 11:41 p.m. | Published |
| What is Tor? | How Does it Work? | Everything About Tor Network | March 19, 2024, 11:40 p.m. | Published |
| How to Access Dark Web | Use Dark Web Links Safely | March 19, 2024, 11:40 p.m. | Published |
| What is the Dark Web | Is Dark Web Illegal? - An Introduction | March 19, 2024, 11:41 p.m. | Published |
| Setting up OWASP ZAP as a Proxy for Your Browser and Performing a Vulnerability Scan | Feb. 13, 2024, 11:36 p.m. | Published |
| How to Install OWASP ZAP on Windows and Linux | June 13, 2023, 1:31 a.m. | Published |
| Snort - Intrusion Detection System & Prevention System | Installation & Use in Windows | June 13, 2023, 1:15 a.m. | Published |
| OWASP ZAP | A Powerful Web Application Security Testing Tool | May 18, 2023, 2:14 p.m. | Published |
| Mastering Snort | An Intrusion Detection and Prevention System | Step by Step Guide | June 13, 2023, 1:15 a.m. | Published |
| Snort - Intrusion Detection System & Prevention System | Installation & Use in Linux | June 13, 2023, 1:15 a.m. | Published |
| What is Intrusion Detection System | What is Intrusion Prevention System | IDS vs IPS | June 13, 2023, 1:15 a.m. | Published |
| Unlocking the Secrets of Advanced SQL Injection Attacks: Part 3 - Blind SQL Injection and Effective Prevention Strategies | June 13, 2023, 1:14 a.m. | Published |
| Mastering Advanced SQL Injection Attacks: Part 2 - Practical Demo and Prevention of Blind SQL Injection | June 13, 2023, 1:14 a.m. | Published |
| Advanced SQL Injection Attack (SQLi) | Blind SQL Injection And Prevention | June 13, 2023, 1:14 a.m. | Published |
| Decoding Website Hacking: A Beginner's Guide to Understanding How the Internet Works | June 13, 2023, 1:14 a.m. | Published |
| What is Website Hacking | Web Application Penetration Testing | Lab Setup | June 13, 2023, 1:14 a.m. | Published |
| Uncovering Vulnerabilities: Shodan, GitHub Dorks, and LinkedIn - OSINT Tools for Bug Hunting | June 13, 2023, 1:14 a.m. | Published |
| Exploring OSINT Tools| DNS Dumpster and Netcraft for Bug Hunters | June 13, 2023, 1:14 a.m. | Published |
| Mastering OSINT| A Comprehensive Guide to Intelligence Gathering for Bug Hunters | June 13, 2023, 1:14 a.m. | Published |
| Unleashing the Power of OSINT| A Complete Guide to the OSINT Framework, Essential Tools, and Best Techniques | June 13, 2023, 1:13 a.m. | Published |
| What is Smurf Attack? | What is the Denial of Service Attack? | Practical DDoS Attack Step By Step Guide | June 13, 2023, 1:12 a.m. | Published |