Site search

Search results: «bugs»

Found matches: 7

1. WEB APPLICATION HACKER’S ’s HANDBOOK
This book teaches you how to find and fix problems in websites. It shows real examples and how hackers attack web apps.

2. THE HACKER’S PLAYBOOK 2
This is like a guidebook for ethical hackers. It gives step-by-step instructions to test and break into systems (legally) for learning.

3. HACKING: THE ART OF EXPLOITATION
This book explains how hacking works inside computers. It teaches programming, how to find bugs, and how hackers use them.

4. GHOST IN THE WIRES
This is a true story about a famous hacker, Kevin Mitnick. He tells how he...
🚨 Mistakes That Are Slowly Destroying Your PC (Stop Doing These!) 💻🔥

Your PC might look fine, but these everyday habits are silently killing its performance and lifespan. Avoid these costly mistakes before it’s too late 👇

✅ Never restarting your PC — Causes memory overload and long-term slowdowns
✅ Too many startup apps — Slows boot time and eats system resources
✅ Ignoring Windows updates — Opens doors to security threats and system crashes
✅ Running with low disk space — Windows needs free space to operate properly
✅ Not cleaning temporary files — Junk data quietly drags performance...
DataLife Engine is a popular content management system. It is constantly being improved by the development team, responding to all current requests. Currently, users can access the major version 19.0, which has undergone active testing and implementation. Before downloading DLE 19.0 nulled, you should carefully review all the key features of the optimized build. You can already take advantage of fast and secure features, optimize websites, and implement relevant functionality in just a few clicks.
The word filter in the panel has been updated. Data has been converted to a convenient storage format for future scalability when implementing required functionality....
Free Forum v. 3.5 modules are compatible with all versions of the CMS engine, including the new 16.0. It's easy to install and configure, and integrates seamlessly with your website.
The package includes two installation files for Forum v. 3.5. The first is the DLE Edition forum, integrated into DLE, and the second is the full version of the forum, displayed on a separate page. Choose the one that suits your needs.
DLE Forum V.3.5 modules feature a responsive design that allows the forum to display on various devices without losing core functionality. The modules feature a stylish design based...
MobSF has Stored XSS via Manifest Analysis - Dialer Code Host Field

A Stored Cross-site Scripting (XSS) vulnerability in MobSF's Android manifest analysis allows an attacker to execute arbitrary JavaScript in the context of a victim's browser session by uploading a malicious APK. The android:host attribute from <data android:scheme="android_secret_code"> elements is rendered in HTML reports without sanitization, enabling session hijacking and account takeover.

https://github.com/advisories/GHSA-8hf7-h89p-3pqj

⚠️ WARNING: LEGAL DISCLAIMER

This tool is intended for educational purposes only. The author is not responsible for any illegal use of this tool. Users aresolely responsible for their actions.

#kalilinux #kalilinuxtools #informationsecurity #ethicalhacker #pentesting #Ubuntu...
SQL Injection Attack — one of the oldest bugs, still one of the most dangerous.

SQL injection happens when user input is treated as executable SQL instead of data. A single unsafe query can expose sensitive data, bypass authentication, or even destroy entire tables.

String interpolation inside raw SQL is a red flag. It allows attackers to inject malicious logic directly into your query. Sanitizing input helps, but it is not enough on its own.

The real fix is parameterized queries.
When parameters are used correctly, the database engine treats input strictly as data — not executable code. No matter...
🔎 What is 𝐘𝐚𝐧𝐝𝐞𝐱 𝐝𝐨𝐫𝐤𝐢𝐧𝐠? (Advanced OSINT Technique)

Most bug hunters know about Google Dorks…

But very few explore the power of Yandex Dorking using Yandex 🔥

Yandex is a Russian search engine that sometimes indexes files and directories that Google ignores — making it extremely powerful for reconnaissance and OSINT.

💡 Why Yandex is Special?

✔️ Different indexing algorithm
✔️ Better exposure of open directories
✔️ Sometimes reveals sensitive files not visible on Google
✔️ Useful for bug bounty & recon

---

🎯 Common Yandex Dork Examples

⚠️ For educational & authorized testing only.

1️⃣ Find Exposed Login Pages...