DOM XSS Vulnerabilities: PortSwigger Labs Walkthrough (Part 1)Learn Dom XSS with Portswigger Labs solution from this step-by-step guide. Perfect for beginners and professionals seeking to master the…Oct 3Oct 3
Dogcat Walkthrough - THMWe take you on an interesting tour and solve the dogcat challenge from tryhackme. We will learn about LFI and how to privilege escalated…Jul 18, 2023Jul 18, 2023
Cybertalents ctf: String highlighterWe will learn how to do Code Injection, access the server content, and execute commands on itJun 25, 2023Jun 25, 2023
CyberTalents: who is admin challengelink arabic version : https://root-x.dev/blog/article/who-is-admin-walkthroughJun 21, 2023Jun 21, 2023
SQL Injection AttacksSQL injection is a type of security vulnerability that occurs when untrusted user input is not properly validated or sanitizedMar 25, 2023Mar 25, 2023
What are Cryptographic and Encryption Algorithms and Examples of Programsis the practice of securing information by converting it into an unreadable format.Mar 11, 2023Mar 11, 2023
Cross site request forgery (CSRF) attackCSRF is a type of vulnerability that allows an attacker to perform unwanted actions on a website on behalf of an authenticated userMar 9, 2023Mar 9, 2023
What is the Open Redirect vulnerability, find it, and protect against itللإطلاع علي النسخة العربيةMar 5, 2023Mar 5, 2023