Sunday, February 5, 2023
Latest:
  • Android Application Penetration Testing / Bug Bounty Checklist
  • How i got idor with xss ;)
  • Introduction of Virtualization and Containerization – Part I
  • How I earn 750$ with Out of Scope (ClickJacking) on HackerOne :D
  • Google Play Security Reward (Bug Bounty Program) Has Been Launched
Blog | Softwaroid Informatics

Blog | Softwaroid Informatics

  • News
  • Learn
    • Web Application Security
      • OWASP Top 10
    • Capture the Flag
  • Cyber Attacks
  • Payloads
  • Bug Bounty
  • About Us
  • Contact

Author: Shahrukh Rafeeq

Uncategorized 

Android Application Penetration Testing / Bug Bounty Checklist

May 2, 2020May 2, 2020 Shahrukh Rafeeq 0 Comments

Android provides an open-source platform and application environment for mobile devices. Organizations and global companies also building mobile apps to

Read more
Docker & Kubernetes Learn 

Introduction of Virtualization and Containerization – Part I

November 25, 2019November 25, 2019 Shahrukh Rafeeq 0 Comments

During the last four-five years cloud and distributed computing were one of the most in-demand technology. Containerization is one of

Read more
Bug Bounty 

How I earn 750$ with Out of Scope (ClickJacking) on HackerOne :D

November 24, 2019November 24, 2019 Shahrukh Rafeeq 3 Comments

Hey everyone, I’d like to share how I found a stupid misconfiguration (No password confirmation on account Delete functionality) and

Read more
News 

Google Play Security Reward (Bug Bounty Program) Has Been Launched

January 12, 2019January 12, 2019 Shahrukh Rafeeq 0 Comments

Google has published the Google Play Security Reward Program to urge security researchers to come forward about security issues in

Read more
Learn 

What is GPU (GRAPHICS PROCESSING UNIT) or Graphics Card

January 11, 2019January 11, 2019 Shahrukh Rafeeq 0 Comments

A graphics processing unit (GPU) is an electronic circuit board designed to rapidly manipulate and accelerate the creation of images,

Read more
Learn 

What is CPU and How it Works…

January 11, 2019January 11, 2019 Shahrukh Rafeeq 0 Comments

When you double-click on an icon to run a program, here is what happens: The program, which is stored on

Read more
Learn 

Top 5 Anti-Phishing Training Programs

January 11, 2019January 12, 2019 Shahrukh Rafeeq 0 Comments

Frequent Testing Stu Sjouwerman, CEO, KnowBe4 Testing users on a frequent basis to see who falls for a simulated phish

Read more
Payloads 

More than 500 Payloads Collection of Cross Site Scripting (XSS)

January 11, 2019January 12, 2019 Shahrukh Rafeeq 0 Comments

Motive of this article is to providing application security testing professionals with a guide to assist in Cross Site Scripting

Read more
Learn 

Types of Malicious Software (Malware)

January 11, 2019January 12, 2019 Shahrukh Rafeeq 0 Comments Malicious programs

Malware is derived from Malicious Software that intentionally designed to harm or damage or destroy your data or disables system,

Read more
Bug Bounty 

List of 450 Best VPN and Proxy Server

January 11, 2019January 12, 2019 Shahrukh Rafeeq 0 Comments anonymity, Proxy server, VPN

Anonymity is used to describe situations where the acting person’s name is unknown. A proxy server is an intermediary for requests from clients seeking resources from

Read more
  • ← Previous

NEWS

Android Application Penetration Testing / Bug Bounty Checklist
Uncategorized 

Android Application Penetration Testing / Bug Bounty Checklist

May 2, 2020 Shahrukh Rafeeq 0

Android provides an open-source platform and application environment for mobile devices. Organizations and global companies also building mobile apps to

Uncategorized 

How i got idor with xss ;)

December 11, 2019 Arjun Singh Sikarvar 4

Subscribe Now

Enter your Email to Subscribe Now, Receive notification and new post in your Inbox

Important Links

  • Softwaroid Informatics
  • CVE- Mitre.org
  • WayBack Machine
  • Whois
  • Google Exploit-DB
  • Forum- Kali Linux
Copyright © 2019 Softwaroid Informatics. All rights reserved.