Investigation: Malicious PDF + OSINTThis blog will help in looking into malicious PDF files utilizing a variety of techniques and resources. We will talk about how to improve…Jun 18Jun 18
How I found Reflected XSS on *.GOV.INThis blog will help you find all the vulnerable parameters in any web application. It will also teach you how to exploit vulnerabilities…May 2, 20238May 2, 20238
Malware Analysis Using ProcDotMalicious software, sometimes referred to as malware, is examined and understood through the process of malware analysis. When malware is…Mar 19, 2023Mar 19, 2023