Anmol K SachanCVE Seeker — Unveiling Cyber Threats: From Assets to Vulnerability InsightsIn the ever-evolving landscape of cybersecurity, staying ahead of potential threats is paramount. Introducing CVE Seeker, a comprehensive…Jun 24Jun 24
Anmol K SachanEnhancing Penetration Testing with CVE Checker Script — ThreatTracer.pPenetration testing, often known as ethical hacking, plays a pivotal role in identifying security vulnerabilities within systems, networks…Aug 10, 2023Aug 10, 2023
Anmol K SachanGraphQL Test Cases: A Comprehensive Checklist for Bug Bounty Hunters and Penetration TestersChecklist available here: https://anmolksachan.github.io/graphql/Apr 11, 2023Apr 11, 2023
Anmol K SachanJIRA”YA — JIRA Yet Another vulnerability AnalyzerAs software development teams use JIRA to track and manage tasks, it has become a popular project management tool. However, with increased…Mar 28, 2023Mar 28, 2023
Anmol K SachanWhat The Cipher: A Python Tool for Pentesters and Security AssessmentsIn this era of growing cybersecurity threats, it is necessary to ensure that the communication between a server and a client is secure. It…Mar 21, 2023Mar 21, 2023
Anmol K SachanCross Injector — A Python Script for Cross-Site Scripting (XSS) DetectionCross-site scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious code into web pages viewed by…Mar 8, 2023Mar 8, 2023
Anmol K SachanThe Time Machine — Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and…You must have heard about time travel in movies, series and comics. Well here we are Nah i’m not joking you can travel back in time and…Jan 29, 20222Jan 29, 20222