top of page
Search
The Tech Platform
Jan 12, 2022
SQL Injection : What are the Types of SQL Injection. How to Detect and Prevent SQL Injection
SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for backend database manipulation to access...
The Tech Platform
Jan 12, 2022
How To Hack Any Web Application (Website)
This article is the third and final installment to this series. This is just a mere introduction tothese following topics. I will be...
The Tech Platform
Dec 20, 2021
Injecting .Net Assembly Into .Net Application
As demonstration purpose, i have written the following app. As you already got what the code does (a simple msgbox says “Hello World from...
The Tech Platform
Sep 15, 2021
Stored XSS to RCE Chain as SYSTEM in ManageEngine ServiceDesk Plus
The unauthorized access of FireEye red team tools was an eye-opening event for the security community. In my personal opinion, it was...
The Tech Platform
Sep 6, 2021
Top 10 Ethical Hacking Tools and their Features
Ethical hacking is the act of discovering vulnerabilities and weaknesses of systems and applications by reproducing the reasons and...
bottom of page