PinnedExploiting Image Header Vulnerabilities: How I Achieved Remote Code Execution (RCE)Discover how an overlooked image upload flaw enabled PHP shell injection, exposing critical server vulnerabilities and security gaps.Jan 16Jan 16
Published inUrsaCodeHow I Slashed a DELETE Query from 3 Minutes to 2 Seconds in PostgreSQLA performance deep dive into foreign keys, trigger costs, and the one index that saved our production environment.May 13May 13
Forgot Password to System TakeoverThe best thing about having a Hacker mind and Programmer mind is that you can find enjoyment everywhere.Jan 13, 2020Jan 13, 2020
Scrape the web — Advance TechniquesIf you are reading this to learn “How to Scrap?”. Then definitely you know about what is Scraping. If you are a new guy to the field and…Dec 27, 2019A response icon1Dec 27, 2019A response icon1
Degree, Skills or BothIt is December 2019 and today’s trend is the discussion between whether Degree is important or not. Majority of the people agrees with the…Dec 4, 2019Dec 4, 2019
How to Automate your Computer with pythonUsing Python, It is possible to create what you have in your mind.Mar 19, 2019A response icon1Mar 19, 2019A response icon1
They vs Me print(“Python Shortcuts”)Python is known for its short code but still people write messy codeMar 14, 2019Mar 14, 2019
Power of Manual SQL Injection and PythonHello there! , Hope you are doing great and learning loads of stuff from the community like I am.Jan 13, 2019A response icon2Jan 13, 2019A response icon2
XSS using meta TagsI was invited by a friend to join a Social platform that helps people to earn money by liking, sharing, updating posts.Apr 30, 2018A response icon1Apr 30, 2018A response icon1