Mar 16 · 13 min read · I was two hours into auditing AnythingLLM when I stopped scrolling and stared at my screen for a good ten seconds. Not because the code was complex. Because it was the opposite. javascript getTableSch
Join discussion
Feb 18 · 3 min read · Resumen Objetivo del reto: elevar las calificaciones de Natasha Drew en el portal de estudiantes OSUSEC para obtener la flag. Contexto del objetivo El challenge indica explícitamente que Natasha no tiene las notas necesarias y hay que ponerle todo e...
Join discussion
Jan 22 · 4 min read · In the era of "Big Data," tools come and go. Hadoop had its moment, NoSQL has its specific use cases, and visualization tools like Tableau rely on clean data feeds. Yet, through decades of technological shifts, SQL (Structured Query Language) remains...
Join discussionJan 9 · 4 min read · [!danger] Rules of Engagement Authorized Use Only. Testing for SQL Injection on servers you do not own or have explicit permission to test is illegal. This guide is for educational purposes, CTF challenges, and hardening your own applications. 1. Th...
Join discussion
Jan 4 · 4 min read · SQL for Beginners: A Practical Guide to Understanding Databases Introduction Data is the backbone of every modern application — from social media platforms and banking systems to e-commerce websites and mobile apps. Managing this data efficiently is ...
Join discussionJan 2 · 5 min read · ব্যাকএন্ড অ্যাপ্লিকেশন তৈরি করার সময়, একজন ব্যাকএন্ড ডেভেলপারকে সার্ভার সুরক্ষিত রাখার উপর মনোযোগ দিতে হবে। বিভিন্ন ধরণের সাইবার এট্যাক হতে পারে । আমি হয়তোবা সবগুলো জানি না, তবে এই ব্লগগুলিতে, আমি সবচেয়ে সাধারণ এবং খুবই জনপ্রিয় কিছু ধরণের এট্যাক ন...
Join discussionDec 30, 2025 · 3 min read · When building a backend application, a backend developer must focus on keeping the server secure. There are many different types of security attacks. I may not know all of them, but in these blogs, I will discuss the most common and traditional types...
Join discussion