Account Take Over | P1 — CriticalIt started off like any other day until I got an unexpected email — an invite to a private bug bounty program. Curious, I jumped in. The…Aug 26Aug 26
Bypass 403 Response Code by Adding Creative String | IRSYADSECHTTP 403 is a response code indicating that access to the requested resource is forbidden. This can happen due to various reasons, such as…Jul 1Jul 1
RootBeer Root Detection Bypass | irsyadsecA few months ago, I conducted penetration testing on an application and discovered that it was protected by the RootBeer library, which is…Jun 21Jun 21
Identifying Website Compromises Using GoogleThe standard site:example.* search instructs Google to return results for all pages within a specific website's domain (example.com) and…Apr 15Apr 15
Unveiling the Relationship Between Cyber Security and AIIn the contemporary landscape of technological advancement, the correlation between cyber security and AI stands as a pivotal nexus shaping…Mar 14Mar 14
Protect Your Server: How to Install and Configure Fail2Ban on Rocky LinuxWould you like to support me so that I could create more free Prompts? Buy me a coffee here!Mar 14Mar 14
system-rc-local-generator[35118]: /etc/rc.d/rc.local is not marked executable, skipping.The Significance of the system-rc-local-generator MessageMar 14Mar 14
Java not found in “update-alternatives — config java” after installing java on linuxIf you’ve recently installed Java on your Parrot OS, but you’re still using previous Java version, you may need to change your Java…May 4, 2023May 4, 2023