Personal Information
Organization / Workplace
Vadodara, Hindu India
Occupation
Cyber Security Researcher
Industry
Technology / Software / Internet
About
I'm passionate information security researcher and CTF player who likes to learn more about hacking.
Tags
synack
openbugbounty
bugcrowd
hackerone
mayur parmar
th3cyb3rc0p
recon
bug bounty
hacking
google dorks
See more
- Presentations
- Documents
- Infographics
Bitcoin Forensics
Apurv Singh Gautam
•
4 years ago
Information Gathering With Google
Zero Science Lab
•
13 years ago
Bug Bounty For Beginners
MehediHasanRemon
•
3 years ago
XXE - XML External Entity Attack
Cysinfo Cyber Security Community
•
7 years ago
OWASP A4 XML External Entities (XXE)
Michael Furman
•
5 years ago
A2 - broken authentication and session management(OWASP thailand chapter April 2016)
Noppadol Songsakaew
•
7 years ago
A2 - broken authentication and session management(OWASP thailand chapter April 2016)
Noppadol Songsakaew
•
7 years ago
JWT: jku x5u
snyff
•
3 years ago
Ethical Hacking
Aditya Vikram Singhania
•
4 years ago
Weaponizing Recon - Smashing Applications for Security Vulnerabilities & Profits
Harsh Bothra
•
3 years ago
Understanding Cross-site Request Forgery
Daniel Miessler
•
10 years ago
Reconnaissance
n|u - The Open Security Community
•
3 years ago
LFI to RCE
n|u - The Open Security Community
•
8 years ago
Pentesting Android Apps using Frida (Beginners)
Chandrapal Badshah
•
5 years ago
Google Dorks
Andrea D'Ubaldo
•
7 years ago
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
Samvel Gevorgyan
•
12 years ago
[Lithuania] Cross-site request forgery: ways to exploit, ways to prevent
OWASP EEE
•
8 years ago
Cross Site Request Forgery (CSRF) Scripting Explained
Valency Networks
•
7 years ago
CSRF Attack and Its Prevention technique in ASP.NET MVC
Suvash Shah
•
8 years ago
Cross Site Scripting ( XSS)
Amit Tyagi
•
13 years ago