RatSec Blog

Introduction Welcome to this tutorial on the importance and relevance of API documentation. In today's digital age, APIs (Application Programming Interfaces) play a crucial role in connecting

Advanced "cut" Command Usage

- Posted in Uncategorized by

The cut command is a powerful tool for manipulating text data by selecting specific columns or fields from a line of text. It's particularly useful when working with structured data that is separated
Introduction: In today's world, security is of utmost importance when it comes to protecting network services from unauthorized access. One of the ways to achieve this is through the use of port

Nikto - An overview

- Posted in tools by

Nitko Scanner Nikto is an open-source web server scanner that helps security professionals and administrators identify potential vulnerabilities and security issues in web servers and web
Authentication: Authentication is the process of verifying the identity of a user, system, or device. In cybersecurity, authentication is a critical step in ensuring that only authorized individuals
Introduction Application Programming Interfaces (APIs) have become an integral part of modern software development. They enable communication between different software components, simplify the

CWEs every pentester should know

- Posted in CWE by

50 CWE's every ethical hacker should know, which ones did I miss? Add your own in the comments! https://thexssrat.podia.com/ethical-hacking-guide-a-z?coupon=90OFF CWE -20: Improper Input

Uncle Rat's XSS Content

- Posted in XSS by

Written https://labs.hackxpert.com/blog/XSS/ https://labs.hackxpert.com/blog/XSS/XSS%200ad0878f33094ea6b8ac90e94c2b0dc2/XSS%20Cheat%20sheet%205c643ce56d1e4ed9871fdd909ded017e.html