Site search

Search results: «bugs»

Found matches: 10

1. WEB APPLICATION HACKER’S ’s HANDBOOK
This book teaches you how to find and fix problems in websites. It shows real examples and how hackers attack web apps.

2. THE HACKER’S PLAYBOOK 2
This is like a guidebook for ethical hackers. It gives step-by-step instructions to test and break into systems (legally) for learning.

3. HACKING: THE ART OF EXPLOITATION
This book explains how hacking works inside computers. It teaches programming, how to find bugs, and how hackers use them.

4. GHOST IN THE WIRES
This is a true story about a famous hacker, Kevin Mitnick. He tells how he...
🚨 Mistakes That Are Slowly Destroying Your PC (Stop Doing These!) 💻🔥

Your PC might look fine, but these everyday habits are silently killing its performance and lifespan. Avoid these costly mistakes before it’s too late 👇

✅ Never restarting your PC — Causes memory overload and long-term slowdowns
✅ Too many startup apps — Slows boot time and eats system resources
✅ Ignoring Windows updates — Opens doors to security threats and system crashes
✅ Running with low disk space — Windows needs free space to operate properly
✅ Not cleaning temporary files — Junk data quietly drags performance...
Script top rating site ioav. The script allows you to collect site statistics. Written in php 5.6 and uses mysql . Of all the undoubted advantages, this is that it has an adaptive beautiful design.

In the script itself, I fixed a bunch (just a big bunch) of bugs with holes. Corrected the design in some places. The script contains the source code of the counters in psd format. You will be able to change the site on the counters yourself. Also in the top works the purchase of advertising or the purchase of vip for the site. There is...
DataLife Engine is a popular content management system. It is constantly being improved by the development team, responding to all current requests. Currently, users can access the major version 19.0, which has undergone active testing and implementation. Before downloading DLE 19.0 nulled, you should carefully review all the key features of the optimized build. You can already take advantage of fast and secure features, optimize websites, and implement relevant functionality in just a few clicks.
The word filter in the panel has been updated. Data has been converted to a convenient storage format for future scalability when implementing required functionality....
I'm posting my game. I've lost the desire to work on it or do anything else. It's fine as a core, everything seems to work, but there are a few bugs. I doubt there are any holes; I think I've checked all the filtering in the script. PDO is used for database access, which is good for protecting against SQL injection attacks. Optimization: The nick function has a static cache to avoid repeated database queries for the same user on the same page. Global variables: The code relies on $pdo and $user, which is typical for procedural engine writing.
- Meet Linus Torvalds
- Built Linux and Git
- Started programming at the age of 10
- Got frustrated with existing operating systems
- At 21, posted a message online:
“I’m doing a free operating system, just a hobby.”
- The project had bugs and limitations
- He made it open source, so others could contribute
- Received million-dollar offers from apple and others, rejected them all

Today, Linux powers:
• Most of the internet
• Android phones
• Supercomputers
• Servers at NASA, Google, and Amazon

- faced another problem: tools for managing code is slow and messy...
Free Forum v. 3.5 modules are compatible with all versions of the CMS engine, including the new 16.0. It's easy to install and configure, and integrates seamlessly with your website.
The package includes two installation files for Forum v. 3.5. The first is the DLE Edition forum, integrated into DLE, and the second is the full version of the forum, displayed on a separate page. Choose the one that suits your needs.
DLE Forum V.3.5 modules feature a responsive design that allows the forum to display on various devices without losing core functionality. The modules feature a stylish design based...
MobSF has Stored XSS via Manifest Analysis - Dialer Code Host Field

A Stored Cross-site Scripting (XSS) vulnerability in MobSF's Android manifest analysis allows an attacker to execute arbitrary JavaScript in the context of a victim's browser session by uploading a malicious APK. The android:host attribute from <data android:scheme="android_secret_code"> elements is rendered in HTML reports without sanitization, enabling session hijacking and account takeover.

https://github.com/advisories/GHSA-8hf7-h89p-3pqj

⚠️ WARNING: LEGAL DISCLAIMER

This tool is intended for educational purposes only. The author is not responsible for any illegal use of this tool. Users aresolely responsible for their actions.

#kalilinux #kalilinuxtools #informationsecurity #ethicalhacker #pentesting #Ubuntu...
SQL Injection Attack — one of the oldest bugs, still one of the most dangerous.

SQL injection happens when user input is treated as executable SQL instead of data. A single unsafe query can expose sensitive data, bypass authentication, or even destroy entire tables.

String interpolation inside raw SQL is a red flag. It allows attackers to inject malicious logic directly into your query. Sanitizing input helps, but it is not enough on its own.

The real fix is parameterized queries.
When parameters are used correctly, the database engine treats input strictly as data — not executable code. No matter...
🔎 What is 𝐘𝐚𝐧𝐝𝐞𝐱 𝐝𝐨𝐫𝐤𝐢𝐧𝐠? (Advanced OSINT Technique)

Most bug hunters know about Google Dorks…

But very few explore the power of Yandex Dorking using Yandex 🔥

Yandex is a Russian search engine that sometimes indexes files and directories that Google ignores — making it extremely powerful for reconnaissance and OSINT.

💡 Why Yandex is Special?

✔️ Different indexing algorithm
✔️ Better exposure of open directories
✔️ Sometimes reveals sensitive files not visible on Google
✔️ Useful for bug bounty & recon

---

🎯 Common Yandex Dork Examples

⚠️ For educational & authorized testing only.

1️⃣ Find Exposed Login Pages...