Category: Web Applications

 

How to hack HTTP Basic and Digest Authentication

How to use User Agent to attack websites

Best Kali Linux tools in WSL (Windows Subsystem for Linux) (Part 1)

How to exploit blind command injection vulnerability

Command injection: exploitation and automated vulnerability search

How to protect web server on Kali Linux from unauthorized access

How to obfuscate JavaScript code

JavaScript Attacks: how to bypass Social Locker for WordPress (CASE)

JavaScript Attacks