PinnedExploiting Image Header Vulnerabilities: How I Achieved Remote Code Execution (RCE)Discover how an overlooked image upload flaw enabled PHP shell injection, exposing critical server vulnerabilities and security gaps.5d ago5d ago
Forgot Password to System TakeoverThe best thing about having a Hacker mind and Programmer mind is that you can find enjoyment everywhere.Jan 13, 2020Jan 13, 2020
Scrape the web — Advance TechniquesIf you are reading this to learn “How to Scrap?”. Then definitely you know about what is Scraping. If you are a new guy to the field and…Dec 27, 20191Dec 27, 20191
Degree, Skills or BothIt is December 2019 and today’s trend is the discussion between whether Degree is important or not. Majority of the people agrees with the…Dec 4, 2019Dec 4, 2019
How to Automate your Computer with pythonUsing Python, It is possible to create what you have in your mind.Mar 19, 20191Mar 19, 20191
They vs Me print(“Python Shortcuts”)Python is known for its short code but still people write messy codeMar 14, 2019Mar 14, 2019
Power of Manual SQL Injection and PythonHello there! , Hope you are doing great and learning loads of stuff from the community like I am.Jan 13, 20192Jan 13, 20192
XSS using meta TagsI was invited by a friend to join a Social platform that helps people to earn money by liking, sharing, updating posts.Apr 30, 20181Apr 30, 20181