Skip to content

Upcoming Hackers

Let's Hack Together

  • Application Pentesting
    • API Pentest
    • WebApp Pentest
  • Network Pentesting
    • CTF
  • Tools Manual
  • Red Teaming
  • Config Review
    • AWS
    • Docker
    • Kubernetes

Latest Post

XSS(Cross Site Scripting) Extracting & Analysis the Firmware Firmware Tools Analysis and Installation Firmware Attack Scenario Firmware Vulnerabilities & Testing Methodology
Recent Posts
  • XSS(Cross Site Scripting)
  • Extracting & Analysis the Firmware
  • Firmware Tools Analysis and Installation
  • Firmware Attack Scenario
  • Firmware Vulnerabilities & Testing Methodology
Trending Tags

Automatic Scans (1) VMDR (1) Vulnerability Management (1)

API Penetration Pentesting

XSS(Cross Site Scripting)

26 May 2025 Pranshu

What is XSS(Cross Site Scripting)? Cross-Site Scripting (XSS) is a security vulnerability found in web applications that allows attackers to inject malicious scripts into web pages viewed by other users.…

API Penetration Pentesting

Extracting & Analysis the Firmware

26 May 2025 Pranshu
API Penetration Pentesting

Firmware Tools Analysis and Installation

26 May 2025 Pranshu

Tools Required: Tools Installation – FAT Binwalk: Download the Firmware:

API Penetration Pentesting

Firmware Attack Scenario

26 May 2025 Pranshu

Elements of IOT Attack Surface 1. Device: The “Device” component is central to any IoT architecture. In this context, “device” refers to any hardware involved in the system. For instance,…

API Penetration Pentesting

Firmware Vulnerabilities & Testing Methodology

26 May 2025 Pranshu

The Open Web Application Security Project (OWASP) is renowned for its emphasis on web application security, but it also offers valuable insights and guidance on a range of other security…

Posts pagination

1 2 … 4

Upcoming Hackers

Let's Hack Together

Proudly powered by Upcoming Hackers |

  • Home
  • API Pentest
  • Application Pentesting
  • Application Pentesting
  • AWS
  • Config Review
  • CTF
  • Docker
  • Home
  • Kubernetes
  • Network Pentesting
  • Network Pentesting
  • Network Pentesting
  • Red Teaming
  • Tools Manual
  • VA Scanning
  • WebApp Pentest