Hunter's Choice

[Hunter's Choice][bleft]

Hunt Security

[Hunt Security][bsummary]

Forensics

[Forensic][grids]

VAPT

[VAPT][twocolumns]
latest posts

Layers of the Web - Surface, Deep, and Dark

The Internet is a very electric place. Everywhere you look, people can be observed sharing their achievements on LinkedIn, game ge...

TOR Browser - Weaknesses

  As we know a coin has two sides same like that Tor has its own set of strengths as it is complex in nature due to its better i...

TOR Browser

Tor Browser is used to access the deep and dark web, where it acts as a default VPN for the user and bounces the network IP addre...

Hacker's views on XSS and References

Cross-site scripting is also known as XSS where  X  stands for  CROSS  and  SS  stands for  SITE SCRIPTING  (just our assumption)....

Introduction to Ubuntu OverlayFS Privesc Vulnerability

CVE-2021-3493 is an Ubuntu-specific issue in the OverlayFS file system in the Linux kernel where it did not properly validate the...

Exploit for Ubuntu OverlayFS Privesc Vulnerability

CVE-2021-3493 is an Ubuntu-specific issue in the overlayfs file system in the Linux kernel where it did not properly validate the ...