Google Dorking Automation for Searching Compromised Websites Using GIDORKThis post is an update and improvement upon a previous article I wrote, which you can read here. In that article, I explained how to easily…Nov 25, 2024Nov 25, 2024
Account Take Over | P1 — CriticalIt started off like any other day until I got an unexpected email — an invite to a private bug bounty program. Curious, I jumped in. The…Aug 26, 20242Aug 26, 20242
Bypass 403 Response Code by Adding Creative String | IRSYADSECHTTP 403 is a response code indicating that access to the requested resource is forbidden. This can happen due to various reasons, such as…Jul 1, 2024Jul 1, 2024
RootBeer Root Detection Bypass | irsyadsecA few months ago, I conducted penetration testing on an application and discovered that it was protected by the RootBeer library, which is…Jun 21, 2024Jun 21, 2024
Identifying Website Compromises Using GoogleThe standard site:example.* search instructs Google to return results for all pages within a specific website's domain (example.com) and…Apr 15, 2024Apr 15, 2024
Unveiling the Relationship Between Cyber Security and AIIn the contemporary landscape of technological advancement, the correlation between cyber security and AI stands as a pivotal nexus shaping…Mar 14, 2024Mar 14, 2024
Protect Your Server: How to Install and Configure Fail2Ban on Rocky LinuxWould you like to support me so that I could create more free Prompts? Buy me a coffee here!Mar 14, 2024Mar 14, 2024
system-rc-local-generator[35118]: /etc/rc.d/rc.local is not marked executable, skipping.The Significance of the system-rc-local-generator MessageMar 14, 2024Mar 14, 2024