An Introduction to OAuth
Have a look at this picture below. I’m sure you have come across this while signing up for an account in many websites. And if you have tried si…
Find out what's new in cybersecurity
Have a look at this picture below. I’m sure you have come across this while signing up for an account in many websites. And if you have tried si…
WHAT IS ELASTICSEARCH? Elastic Official If you look at google, you may find a variety of answers: “Analytics Engine”, “Data Store”, “Search Engine…
Overview Footprinting is usually used by hackers and cybersecurity experts to find information about a target(the target being a person, a machine…
According to Wikipedia , In meteorology, a cloud is an aerosol consisting of a visible mass of miniature liquid droplets, frozen crystals, or other p…
Why should you hunt for subdomains for a website as a penetration tester/ bug bounty hunter? To answer the question we need to know what is a subdoma…
Introduction to pip Most of the programmers would already know what is pip? Pip is a package manager for Python. It is used to install packages, upda…
What is WEB 3.0? The goal of Web 3.0 is to eliminate reliance on a single server or database. Web 3.0 sites and programmes will function on peer-to…