Subscribe to:
Comments (Atom)
CEH V12 vs CEH V11 Difference
The EC-Council update launched on 7th September 2022 from its predecessor version 11 Certified Ethical Hacker Version 12 (CEH v12) is now a...
-
One Plus 9 Specification Leak Recently One Plus 9 mobile Specification leaked on Benchmark Site. The new One Plus 9 is Coming with the lates...
-
SAST vs DAST If you come across what is SAST and DAST. Than probably you are looking for application source code review. we will know what e...
-
Redmi K40 PRO and Redmi K40 Specification and Launched Today Xiaomi Launched its Sub Brand Redmi K Series Premium phones Redmi K40 PRO and ...
-
How to use FoxyProxy in Mozilla Firefox for Burp Suite The foxy proxy is used to make a proxy in the browser. Foxyproxy is a browser extensi...
-
How to find OPTIONS method Enable Vulnerability Today we are going to Learn various techniques to find OPTIONS Method Enable in Web-Applicat...
-
The EC-Council update launched on 7th September 2022 from its predecessor version 11 Certified Ethical Hacker Version 12 (CEH v12) is now a...
-
LOG4J VULNERABILITY ASSESSMENT AND MITIGATION What is Log4j? Log4j, Zero-day exploit the popular Javalogginglibrarylog4j2 was discovered t...
-
WhatsApp Bugs that Could Have Let Attackers Hack Devices Remotely Critical WhatsApp has released security updates to address two flaws in it...
-
How to Find saved Wi-Fi Password in Windows Using CMD and GUI In this Thread we will learn how to check the saved Wi-Fi password in our wind...
-
How to Deploy Multiple Dist file to the Apache Server To Deploy Multiple Dist file apache server the Easiest way i have describe below fol...