Cryptocurrency Technical Analysis using Python and TA-LIBDisclaimer: I’m not a financial advisor or technical analysis expert. This post is purely for educational purpose. I do not recommend the…May 3, 2021May 3, 2021
LinkDumper Burp PluginTab view panel using IMessageEditorTab to dump all the links from the responses:Aug 27, 2019Aug 27, 2019
SVG XLink SSRF fingerprinting libraries versionSSRF(Server-side-request-forgery) have been quite a popular attack surface for the uploading functionality where application fetches the…Mar 2, 20191Mar 2, 20191
Broken Link Hijacking Burp PluginBroken Link Hijacking (BLH) is lesser known attack.there is an brief introduction & exploitation about it by EdOverFlow.Nov 27, 2018Nov 27, 2018
Published inHackerNoon.comCryptoTelegram Bot: to Automate your Basic CryptoWorkA Year Ago,While learning python,I had created a telegram bot to automate the cryptoworkflow of daily life for learning purpose which…Sep 10, 20181Sep 10, 20181
Distance Calculation with Ultrasonic SensorProject at Hackster.io : https://www.hackster.io/arbazhussain/distance-calculation-with-ultrasonic-sensor-26d63eSep 9, 20181Sep 9, 20181
Gathering domains/subdomains with IPRanges of organizationOne of the major role of penetration testing is recon-asset.The more you gather information,the more you win.Sep 9, 20183Sep 9, 20183
Published inInfoSec Write-upsContent negotiation With CSRFIn this blog post i would like to share some Content Negotiation behavior while Performing CSRF Request .Apr 13, 20184Apr 13, 20184
Weaponizing Clickjacking Attack With Click Content JackingI Would like to share one simple trick to make clickjacking attack’s more impactful in simple Word’s.Nov 5, 20178Nov 5, 20178
Published inHackerNoon.comAbsolute Beginning into Machine LearningThis blog post will help Getting start to Machine Learning Journey to Deep Learning . I have tried to keep it short and clean .Nov 2, 20174Nov 2, 20174
Published inInfoSec Write-upsPre-domain wildcard CORS ExploitationSeverity: HighAug 26, 20172Aug 26, 20172
First-time attendee’s experience at Nullcon 2017.It was in January 2017 when I heard of Nullcon 2017 Annual security conference. I’ve been in curiosity since Nullcon’s 2015 information…Aug 26, 2017Aug 26, 2017
Published inHackerNoon.com#10 Rules of Bug BountyAkita Zen And Me Would like to share our personal views and tip’s to be Successful at Bug Hunting .Aug 8, 20179Aug 8, 20179
Auto Web Cache Deception ToolI Would like to share simple Web Cache Testing Script Which Could be useful for finding Web Cache Deception issue’s And broken…Aug 7, 2017Aug 7, 2017