Hello Guys, took a bit long, but as I said here is the 2nd part of web application pen-testing methodology Before going for client-side vulnerabilities.
I am a Cyber Security Enthusiast and a Hacker with an Ethical mindset.
I m having experience in Web Application, Android Application, Network, API Testing, Vulnerability Assessment and Penetration Testing. I am experienced with tools like Burpsuit,accutenix, Nessus, Nmap, Frida, Drozer, Postman, Siem tools and of course with Kali Linux & some GitHub open source tools & many more for finding the vulnerabilities in the web application and mobile application.
Skills & abilities
Jobs & Education
B.Tech Computer Science & Engineering
Business Development Manager
Independent Security Researcher
Application Security Analyst
Hello, Guys, I m back with a new blog on bug bounty, I found this bug recently on independent bug bounty program, thought of sharing
Hello Guys, Ninad here I hope you are doing good, so today's topic is How to start with web application pen-testing. I would be dividing
Hello people, hope you are doing good and playing well with security! Today I am here again with a topic known as Insecure Direct Object
Hello guys welcome to my blog, Let me tell this is my first blog and will be further writing more blogs on critical vulnerabilities that
Hello people, hope you are doing good and playing well with security! Today I am here again with a topic known as SSL pinningWhat is