hothead01th.hashnode.devThe Ultimate Guide to 100 Web Vulnerabilities (categorized)IntroductionIn the ever-evolving landscape of web security, understanding vulnerabilities is critical for developers, security professionals, and organizations. This comprehensive guide explores 100 web vulnerabilities, categorized for clarity, to he...Jan 30, 2025ยท6 min read
hothead01th.hashnode.devExposing the Dark Side of JSON Web Tokens (JWT)JSON Web Tokens (JWTs) have become the backbone of modern web authentication, promising secure identity and privilege transfer. JWTs are cryptographically protected tokens transferring identity and privilege information about a user or client. Encode...Dec 9, 2024ยท9 min read
hothead01th.hashnode.devHow to Create Dangerous Notepad VirusesDisclaimer:This blog is for educational purposes only. I am not responsible for any damage caused by implementing the steps below. If you proceed, you do so at your own risk. Do not test this on your primary system. Introduction A virus is a malicio...Nov 17, 2024ยท3 min read
hothead01th.hashnode.devUnderstanding the Malicious Use of OAuth ApplicationsThe Comprehensive Guide to Malicious Use of OAuth Applications: Understanding Parameters, Charts, and Case Studies OAuth (Open Authorization) is essential in today's interconnected digital landscape, facilitating secure access to user data across var...Nov 2, 2024ยท4 min read
hothead01th.hashnode.dev50+ LinkedIn Growth Hacks.In today's digital age, LinkedIn has emerged as the quintessential platform for professionals, entrepreneurs, and businesses aiming to establish a robust online presence. With over 900 million members globally, LinkedIn offers unparalleled opportunit...Jun 12, 2024ยท6 min read