Auntor AcharjaHow to run an automation script or bot even if there is any verification or Google CAPTCHAIntroduction:In the world of automation, where we aim to streamline repetitive tasks, encountering verification and Google CAPTCHA2 min read·Nov 4, 2023----
Auntor AcharjaGoogle Map 5-Star Review BotIntroduction:In today’s digital age, online reviews play a crucial role in shaping the reputation and success of businesses. Google Maps…3 min read·Sep 23, 2023----
Auntor AcharjaError Based SQL InjectionWe mainly use error base SQL injection when we do not access any website admin by manual SQL injection or WAF Bypass.3 min read·Nov 18, 2020----
Auntor AcharjaSQL injection using SqlmapSQL injection is a code injection technique that might destroy database.SQL injection is one of the most common web hacking techniques.SQL…4 min read·Oct 14, 2020----
Auntor AcharjaMake a Strong Wordlist By Crunch and CuppCrunch is a wordlist generating tool that comes pre-installed with Kali Linux. It is used to generate custom keywords based on wordlists…3 min read·Oct 12, 2020----
Auntor AcharjaLogin Brute Force using BurpSuiteBurp Suite is a set of tools used for penetration testing of web applications. It is the most popular tool among professional web app…3 min read·Oct 11, 2020----
Auntor AcharjaCross-site Scripting(XSS) test by XSS-SniperXss-Sniper is a web penetration testing tools used for test XSS attack on the website. It is an open-source tool and it is not pre-install…1 min read·Oct 10, 2020----
Auntor AcharjaBrute Force on the Web server by “dirb”DIRB is a Web Content Scanner. It mainly used for a dictionary-based attack against a web server. If we want to brute force to get a…2 min read·Oct 9, 2020----
Auntor AcharjaNetwork Scanning by NmapNmap is a powerful network security tool used for network mapping and port scanning.Although Nmap used for port scanning, Nmap offers many…5 min read·Sep 24, 2020----
Auntor AcharjaError Based SQL InjectionWe mainly use error base SQL injection when we do not access any website admin by manual SQL injection or WAF Bypass.3 min read·Sep 21, 2020----