Lazy HackerBinary Protection Checker & Sig Checker Automation ScriptI have developed an automation script for testing binary protection and signature issues. Previously, we had to open the terminal and enter…1 min read·Mar 29, 2024----
Lazy HackerNo Validation Of LinkedIn Primary Email Address before Deletion Cause Account Take OverThe vulnerability that I am writing here happened to me. My LinkedIn account was hacked and somebody changed the primary email address with…5 min read·Jul 28, 2023--3--3
Lazy HackerSome Mitigation Against Phishing and MITMRegular phishing awareness should be done in the organization.1 min read·Sep 17, 2022----
Lazy HackerRun Terminal Binaries in Burp: BurpBinaryRunner — (My 2nd Burp Extension in Jython)This tool is used to run binaries through Burp, tools like SSLscan, Nmap, FFUF, etc. The binaries that give the output on the terminal can…1 min read·Aug 28, 2022----
Lazy HackerWhy the Older & Vulnerable Version in use Vulnerability should be of HIGH severityWhy the Older & Vulnerable Version in use Vulnerability should be of HIGH severity2 min read·Aug 27, 2022----
Lazy HackerMy First Burp Extension | Enable Tor Proxy By BurpHello Everyone,1 min read·Aug 13, 2022----
Lazy HackerWhat are serialization and deserialization? | What is insecure deserialization?What is serialization?2 min read·Aug 3, 2022----
Lazy HackerWhat is salting in cryptography?Salting is the concept of adding random data in the plaintext data (Example: Password) and then creating the hash of that combination this…1 min read·Jul 31, 2022----
Lazy HackerIs your webcam exposed on the internet and everyone enjoying your personal moments?Nowadays we start using many technology devices in our homes. Many people are installing CCTV or security cameras in their houses, private…2 min read·Jul 14, 2022----
Lazy HackerFake Traffic By Proxy | Use proxy to send requests to the server | Send traffic from multiple free…There are many ways to achieve this, one of the ways is here.2 min read·Jul 12, 2022----