A Hacker’s Mind, A Philosopher's Soul

  • Home
    • About Me
    • Get In Touch
  • CyberSecurity
    • Research & Publications
    • Cybersecurity Insights
    • CyberTools
  • Let’s Work Together
  • Personal Projects
    • Philosophy
    • Books by Khirawadhi
  • Twitter
  • Facebook
  • Instagram

Category: Snort Signature

  • Leveraging PowerShell During Exploitation

    Leveraging PowerShell During Exploitation

    July 15, 2024
  • Understanding Same Origin Policy (SOP) and Cookies: A Practical Lab Guide

    Understanding Same Origin Policy (SOP) and Cookies: A Practical Lab Guide

    July 15, 2024
  • Web Application Attacks

    Web Application Attacks

    July 15, 2024
  • WEB APPLICATION PENTESTING CHECKLIST

    WEB APPLICATION PENTESTING CHECKLIST

    July 15, 2024
  • Map Application Architecture

    Map Application Architecture

    April 29, 2024
  • Unveiling Application Entry Points: Understanding the Gateway to Digital InteractionsIdentify application entry points

    Unveiling Application Entry Points: Understanding the Gateway to Digital InteractionsIdentify application entry points

    April 29, 2024
1 2 3 … 10
Next Page→

Khirawadhi

A Hacker’s Mind, A Philosopher's Soul

ona_follow
  • Mail
  • Home
    • About Me
    • Get In Touch
  • CyberSecurity
    • Research & Publications
    • Cybersecurity Insights
    • CyberTools
  • Let’s Work Together
  • Personal Projects
    • Philosophy
    • Books by Khirawadhi