Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    Yearly Archives: 2020

    1. Home  - 
    2. 2020
    3. ( Page3 )
    22 Jan, 2020
    PHP Object Injection Vulnerabilities
    Coding Injection, PHP, SQL Injection

    Nowadays, PHP can be considered as one compulsory programming language needed to build up a website for any organization. For Developer point of view, PHP is very easy to code compared with other website programming language. Below are the example

    Continue ReadingPHP Object Injection Vulnerabilities

    21 Jan, 2020
    Penetration Testing with Perl Language
    Coding Penetration Testing, PERL, Programming

    Previously, I have published a post that related to Python Penetration Testing where I will be sharing about Penetration Testing using Perl Language this round. For those who are not familiar with PERL for Penetration Testing, the user will need

    Continue ReadingPenetration Testing with Perl Language

    15 Jan, 2020
    Penetration Testing using Python Code
    Penetration Testing Nmap, Penetration Testing, Python

    Nowadays, programming is considered as a very important element in the industry especially IT. In this post, I would like to share a brief knowledge about Penetration Testing using Python code which can be useful for other people out there.

    Continue ReadingPenetration Testing using Python Code

    5 Jan, 2020
    Gobuster Review Tools
    Application Applciation, Kali Linux, Linux, MacOS, Penetration Testing, Tools

    Introduction and credit Before I start to review the tools, I would like to give credit to OJ Reeves and Christian Mehlmauer for Gobuster tools. Gobuster is been used for Bruteforce Dir, Vhost and DNS of the target’s domain which

    Continue ReadingGobuster Review Tools

    3 Jan, 2020
    Cross-origin resource sharing Review
    Penetration Testing Browser, Masterclass

    Cross-origin resource sharing can be considered as one of the attacks that the website application server vulnerabilities. Normally, it will enable any controlled access to the bug located where it will run the Cross-origin rules such as Access-Cross-Allow-Origin: However, this

    Continue ReadingCross-origin resource sharing Review

    Posts pagination

    1 2 3
    Copyright © 2026 Threatninja.net | Powered by Neom