Disclaimer: I’m not a financial advisor or technical analysis expert. This post is purely for educational purpose. I do not recommend the use of technical analysis as a sole means of trading decisions.

  • One of the essential skills I had learned in a recent time is technical analysis, where we predict the price movements using historical price charts and market statistics trends.

Tab view panel using IMessageEditorTab to dump all the links from the responses:


Dump links from respones,If url is hex/url encoded then decode it,Sort all the results to put the most likeable links at the top & rest junk(html/javascript junk) in the last.

Why to include junk? why not just links:

  • Finding all possible type links is really difficult task,There are many cases where the endpoints are stored in differential structures where they are hard to extract using regex.


Dump links from the responses of content-types defined at WHITELIST_MEMES list. Modify it accordingly, The more you keep it accurate the less memory it takes.


  • SSRF(Server-side-request-forgery) have been quite a popular attack surface for the uploading functionality where application fetches the assets from external resources in form of images,documents etc

During the testing process, I encountered with XLINK based SSRF to enumerate various internal libraries, installed tools, gnome version’s, much more etc,

POST /upload HTTP/1.1
Host: redacted.com
Connection: close

  • Broken Link Hijacking (BLH) is lesser known attack.there is an brief introduction & exploitation about it by EdOverFlow.

https://edoverflow.com/2017/broken-link-hijacking/ by Ed

  • There is an already fully customize package for discovering BLH endpoints, https://www.npmjs.com/package/broken-link-checker but setting it up is really painful,Authentication based link validating was also an problem with it.


Burp Extension to discover broken links using IScannerCheck & synchronized threads.



Supports various HTML elements/attributes with regex based on following


  • Concurrently checks multiple links using defined threads.

  • A Year Ago,While learning python,I had created a telegram bot to automate the cryptoworkflow of daily life for learning purpose which includes following features.
  1. Buy/Sell pairs on binance : set a Buy price & Sell price along with PAIR,Automatically BUY’S it if the pair hit’s the buying price and SELL’s if the pair hit’s the selling price.

Project at Hackster.io : https://www.hackster.io/arbazhussain/distance-calculation-with-ultrasonic-sensor-26d63e

Ultrasonic distance sensors are designed to measure the distance between the source and target using ultrasonic waves.

Things used in this project

  • One of the major role of penetration testing is recon-asset.The more you gather information,the more you win.
  • I wrote a short script to gather all possible domains/subdomain under the ipranges by following steps.

IPRANGE => Takes one by one ip from range => Resolve…

In this blog post i would like to share some Content Negotiation behavior while Performing CSRF Request .

While Performing Penetration Testing on Application API , I Came across Content Negotiation behavior . Let’s discuss this with live example which i encountered .

Following is the Request which Server made with ClientID in order to generate AUTH Token.Since it has no protection against CSRF Attack .

Origin Request
  • As soon as i saw the above Request , I Quickly tried CSRF .

I Would like to share one simple trick to make clickjacking attack’s more impactful in simple Word’s.

Before getting into topic , let’s understand what click-jacking Means in 101 :

Clickjacking is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information while clicking on seemingly innocuous web pages. ~ Wikipedia

Clickjacking attack basically means Tricking the user into clicking something by framing Page to perform some malicious Action’s. ~ 101

  • Suppose we are Targeting (http://victim.com) Which is simple Blogging Website .
Simple Blogging Website
  • And…

This blog post will help Getting start to Machine Learning Journey to Deep Learning . I have tried to keep it short and clean .

Machine learning is a method of data analysis that automates analytical model building. Using algorithms that iteratively learn from data, machine learning allows computers to find hidden insights without being explicitly programmed where to look. Essentially, it is a method of teaching computers to make and improve predictions based on some data.

In the past decade, machine learning has given us self-driving cars, practical speech recognition, effective web search, and a vastly improved understanding of…

Arbaz Hussain

Security Analyst

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store