877.791.9571 |

About the Author:

Dame Jovanoski is a freelance web developer with an immense enthusiasm in computer security. He has recently been an Openlab Student in CERN working in a project connected with web security. He has been interested in computer security since high school and for the time being he is a researcher/contributor for InfoSec institute. He is also a member of Zero Science Lab, Macedonian company for research and developing web and desktop application exploits.

XML vulnerabilities

1. Introduction

As we know, today’s web technology advances are fast in good and bad ways. With almost every technology, if not used properly, its results might be devastating. Many […]


Which weapon should I choose for Web Penetration Testing? 3.0


So here we are on the third edition of “Which weapon should I choose for Web Penetration Testing?” For this edition, I am going to take a walk through […]


Which Weapon Should I Choose for Web Penetration Testing? 2.0


This is the second edition of “Which weapon should I choose for Web Penetration Testing?” I hope that you liked the first edition. The same rule applies to this […]


Which Weapon Should I Choose for Web Penetration Testing? – First Edition


Here is the first edition of my selection of penetration testing tools for web applications. There will be more editions of this topic so if you have a tool […]


Cross-Site Scripting with ChEF – A Newbie Guide


In this article I am going to explain about how you can use Cross-Site Scripting (XSS) vulnerability and how to exploit it in order to cause massive damage. Nah […]

crime scene

Investigating the Crime Scene Part 2: Recovering Files with Autopsy

For part one of this series, please click here.


So, in the previous part we saw how we can set up the environment for finding clues and also how to […]

crime scene

Investigating the Crime Scene, Part 1: A Brief Introduction to Computer Forensics and Autopsy

Recommended reading


First Responder’s Guide to Computer Forensics – CERT (search for it on Google)


Sometimes out of curiosity you might happen to hack a government computer, and as the adrenaline […]


Raising a Rogue Access Point


Before beginning this article I want to clear up some stuff about awareness. Everything that is going to be described in this article must be used only for educational […]


Bypassing SEH Protection: A Real-Life Example

Recommended Reading

Before starting any kind of exploiting, if you are not familiar with buffer overflow, assembler, or how the operating system works, I strongly recommend reading the content from […]