Zubair UsmanExploiting CVE-2014–3566 Weak SSL/TLS Configurations: A Guide to Assessing and Attacking Outdated…This guide will walk you through analyzing weak SSL/TLS configurations using a Nmap scan and demonstrate how attackers can exploit them…Sep 23Sep 23
Zubair UsmanBug Hunting with GPT: Advanced Tips, Tricks, and Prompts — Volume 2Building on the foundation of our previous discussion on using GPT for bug hunting, this volume delves deeper into advanced techniques…Jul 1Jul 1
Zubair UsmanSoftware Testing in the Era of IoT: A Research ArticleThe rapid expansion of IoT devices has brought with it a new set of challenges for software testing.Oct 4, 2023Oct 4, 2023
Zubair UsmanBug Hunting with GPT: Tips, Tricks, and PromptsIn this article, we will share some of the best GPT tips and tricks for bug hunting, based on our own experience and research…Sep 22, 2023Sep 22, 2023
Zubair UsmanModern Approaches to Software Quality Assurance TestingIntroductionSep 5, 2023Sep 5, 2023
Zubair UsmanDeep dive into SQL injection attacks tips and tricksSQL injection (SQLi) is a type of web application vulnerability that allows an attacker to execute arbitrary SQL commands in a database…Feb 24, 2023Feb 24, 2023
Zubair UsmanTools & Guide for web hackingI’m new to all of this; how do I get started? Scratch to Advance …Nov 29, 2022Nov 29, 2022
Zubair UsmanExploiting the xmlrpc.phpbruteforce, Burpsuite, pingback, pingback.ping, wordpress, xmlrpcAug 31, 2022Aug 31, 2022
Zubair UsmanBug Bounty Methodology (Volume 2)I have collected from all over the internet with different blogs and adding them here to make one TTP that contains all about getting…Oct 28, 2021Oct 28, 2021
Zubair UsmanBest Source for learning: BUG BOUNTY HUNTINGBug Bounty Platforms, Books for reading about Bug Hunting, Remain Anonymous and Evade NSA Spying, Mobile hacking, Practice…Apr 10, 2021Apr 10, 2021