DEV Community

Very Lazy Tech profile picture

Very Lazy Tech

🛋️ Welcome to Very Lazy Tech! 🖥️ Hey, I'm your tech guide focused on simplicity. Join me as we navigate the world of tech with ease.

Open Redirect Vulnerability: Exploitation, Prevention & Real-World Examples - @verylazytech

Open Redirect Vulnerability: Exploitation, Prevention & Real-World Examples - @verylazytech

5
Comments
1 min read
🚀 The Power of OSINT: How Hackers & Investigators Gather Hidden Data! 🔍

🚀 The Power of OSINT: How Hackers & Investigators Gather Hidden Data! 🔍

5
Comments
1 min read
Top Hacking Books for 2025 (plus Resources) — @verylazytech

Top Hacking Books for 2025 (plus Resources) — @verylazytech

5
Comments
5 min read
Top Hacking Gadgets for 2025 - @verylazytech

Top Hacking Gadgets for 2025 - @verylazytech

5
Comments
1 min read
Comprehensive CEH v13 Study Guide

Comprehensive CEH v13 Study Guide

10
Comments
4 min read
Top 7 Payloads lists Every Bug Bounty Hunter Need To Know

Top 7 Payloads lists Every Bug Bounty Hunter Need To Know

5
Comments
3 min read
CVE-2024-9935 - PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary File Download

CVE-2024-9935 - PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary File Download

5
Comments
1 min read
Top 5 Must-Read Books to Master Web Penetration Testing (Beginners & Beyond)

Top 5 Must-Read Books to Master Web Penetration Testing (Beginners & Beyond)

6
Comments
4 min read
POC — CVE-2024–10914 Command Injection Vulnerability in `name` parameter for D-Link NAS

POC — CVE-2024–10914 Command Injection Vulnerability in `name` parameter for D-Link NAS

5
Comments
2 min read
Jenkins File Read Vulnerability - CVE-2024-23897

Jenkins File Read Vulnerability - CVE-2024-23897

5
Comments
2 min read
Top Hacking Books for 2024 (plus Resources): FREE and Paid

Top Hacking Books for 2024 (plus Resources): FREE and Paid

2
Comments
7 min read
loading...