Sunday, February 5, 2023
Latest:
  • Android Application Penetration Testing / Bug Bounty Checklist
  • How i got idor with xss ;)
  • Introduction of Virtualization and Containerization – Part I
  • How I earn 750$ with Out of Scope (ClickJacking) on HackerOne :D
  • Google Play Security Reward (Bug Bounty Program) Has Been Launched
Blog | Softwaroid Informatics

Blog | Softwaroid Informatics

  • News
  • Learn
    • Web Application Security
      • OWASP Top 10
    • Capture the Flag
  • Cyber Attacks
  • Payloads
  • Bug Bounty
  • About Us
  • Contact

Learn

Docker & Kubernetes Learn 

Introduction of Virtualization and Containerization – Part I

November 25, 2019November 25, 2019 Shahrukh Rafeeq 0 Comments

During the last four-five years cloud and distributed computing were one of the most in-demand technology. Containerization is one of

Read more
Learn 

What is GPU (GRAPHICS PROCESSING UNIT) or Graphics Card

January 11, 2019January 11, 2019 Shahrukh Rafeeq 0 Comments

A graphics processing unit (GPU) is an electronic circuit board designed to rapidly manipulate and accelerate the creation of images,

Read more
Learn 

What is CPU and How it Works…

January 11, 2019January 11, 2019 Shahrukh Rafeeq 0 Comments

When you double-click on an icon to run a program, here is what happens: The program, which is stored on

Read more
Learn 

Top 5 Anti-Phishing Training Programs

January 11, 2019January 12, 2019 Shahrukh Rafeeq 0 Comments

Frequent Testing Stu Sjouwerman, CEO, KnowBe4 Testing users on a frequent basis to see who falls for a simulated phish

Read more
Learn 

Types of Malicious Software (Malware)

January 11, 2019January 12, 2019 Shahrukh Rafeeq 0 Comments Malicious programs

Malware is derived from Malicious Software that intentionally designed to harm or damage or destroy your data or disables system,

Read more
Learn 

What is Hacking and Who are Hacker….?

January 11, 2019January 11, 2019 Shahrukh Rafeeq 0 Comments Cyber Terrorist, Ethical hacking, Exploit vulnerabilities, Malicious hackers

Hacking Computer hacking refers to exploit vulnerabilities (weakness in system or network) compromising security controls to gain unauthorized or inappropriate

Read more
Learn 

Top 10 Open Source and 40+ Vulnerable Website that intentionally allow you to perform attack, practicing your Hacking Skills

January 11, 2019January 12, 2019 Shahrukh Rafeeq 0 Comments Owas top 10, Web application vulnerability

Nowadays, People dealing with cyber security can’t learn essential things on infosec because of lack of resource available, if they

Read more

NEWS

Android Application Penetration Testing / Bug Bounty Checklist
Uncategorized 

Android Application Penetration Testing / Bug Bounty Checklist

May 2, 2020 Shahrukh Rafeeq 0

Android provides an open-source platform and application environment for mobile devices. Organizations and global companies also building mobile apps to

Uncategorized 

How i got idor with xss ;)

December 11, 2019 Arjun Singh Sikarvar 4

Subscribe Now

Enter your Email to Subscribe Now, Receive notification and new post in your Inbox

Important Links

  • Softwaroid Informatics
  • CVE- Mitre.org
  • WayBack Machine
  • Whois
  • Google Exploit-DB
  • Forum- Kali Linux
Copyright © 2019 Softwaroid Informatics. All rights reserved.