Install Node with Node Version Manager (nvm)
If you’ve run into issues trying to install Node.js or npm on your server, you may want to consider installing a custom Node version. This post will walk you through the steps of installing a custo...
If you’ve run into issues trying to install Node.js or npm on your server, you may want to consider installing a custom Node version. This post will walk you through the steps of installing a custo...
This setup process is an amalgamation of best practices when it comes to setting up, deploying, releasing, and developing a large web application on most shared hosting platforms. As most of the sh...
Server Setup Steps To enable SSH access to your VirtualBox virtual machine, follow these steps: Step 1: Configure Network Settings Open VirtualBox and go to the Network Settings of your virtu...
Developing software with Python often involves setting up Python on your local machine, installing required libraries via the terminal, writing code in a single .py file or notebook, and running th...
Similarly to Node.js, Python is a popular programming language that is used for a variety of applications. It is known for its simplicity, versatility, and ease of use. Python is also a great langu...
Personalizing your Vim configurations can be an incredibly helpful and efficient way to optimize your coding experience. As someone who has been hacking for years, I’ve learned that every developer...
A popular competition in the cybersecurity community is known as CTF or “Capture the Flag.” These events often take place at hacker conferences such as DEFCON, ROOTCON, HITB, and hackathons. CTF ga...
CTF (Capture The Flag) is a game that challenges you to find a hidden flag on a server or behind a webpage. The flag is a specific piece of text that you need to find to win the game. There are dif...
Introduction This article is a part of the Web Exploitation series. You can check the other articles in the series below. Web Exploitation Now, let’s get started! Cross-Site Request Forgery...
Introduction This article is a part of the Web Exploitation series. You can check the other articles in the series below. Web Exploitation Now, let’s get started! What is Directory Traversa...