Cyber Samie
Explore detailed tutorials, security tools, cheat sheets, and step-by-step guides designed for students, researchers, and tech enthusiasts. Stay updated with the latest cybersecurity news, vulnerabilities, and real-world digital threats affecting individuals and organizations.
Latest posts
View allHow to Find and Exploit Server-Side Request Forgery
How to Find and Exploit Server-Side Request Forgery :A Complete Guide for Bug Bounty Hu…
Samir KC
How to Find and Exploit LFI — A Complete Guide for Bug Bounty Hunters
Local File Inclusion (LFI) vulnerabilities represent a critical class of web applicati…
Samir KC
How to Find and Exploit HTML Injection — A Complete Guide for Bug Bounty Hunters
This post is provided strictly for educational purposes. It is intended solely for autho…
Samir KC
SQL injection, Insecure Direct Object Reference (IDOR), and Cross-Site Scripting (XSS) with paylods
SQL injection, Insecure Direct Object Reference (IDOR), and Cross-Site Scripting (XSS) re…
Samir KC