Blog
Insights, tutorials, and research on cybersecurity, penetration testing, and security best practices

Article2 min read
Auth Bypass with PHP Type Juggling
Auth Bypass with PHP Type Juggling In this post, we will learn how to bypass authentication using PHP type juggling. Introduction PHP type juggling refers to the automatic conversion of data types during comparison operations. PHP offers two modes of compariso
Udesh
→

Article2 min read
Uploading Web Shells with SQLmap
In this article, we will learn how to upload a web shell using SQLmap. SQLmap is a popular tool for automating SQL injection detection and exploitation. It is widely used by security professionals and penetration testers to identify and exploit SQL injection v
Udesh
→