<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 10:45:01 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/webhacking/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Secuholic's WebHacking Tutorial - 0. Introduce SWT]]></title><description><![CDATA[Secuholic's WebHacking Tutorial - part0. Introduce SWT Introduce Hello. Welcome To Secuholic's Webhacking Tutorial. In the past few years, I've been Pen Testing hundreds of websites, reading numerous books]]></description><link>http://direct.ecency.com/webhacking/@secuholic/secuholic-s-webhacking-tutorial-0-introduce-swt</link><guid isPermaLink="true">http://direct.ecency.com/webhacking/@secuholic/secuholic-s-webhacking-tutorial-0-introduce-swt</guid><category><![CDATA[webhacking]]></category><dc:creator><![CDATA[secuholic]]></dc:creator><pubDate>Mon, 27 Aug 2018 15:46:18 GMT</pubDate></item><item><title><![CDATA[Insecure Direct Object References | (Most Common Vulnerabilities to Hack Websites)]]></title><description><![CDATA[Insecure Direct Object References: According to owasp:  Insecure Direct Object References occur when an application provides direct access to objects based on user-supplied input. As a result of this]]></description><link>http://direct.ecency.com/hacked/@ammadkhalid/insecure-direct-object-references-or-most-common-vulnerabilities-to-hack-websites</link><guid isPermaLink="true">http://direct.ecency.com/hacked/@ammadkhalid/insecure-direct-object-references-or-most-common-vulnerabilities-to-hack-websites</guid><category><![CDATA[hacked]]></category><dc:creator><![CDATA[ammadkhalid]]></dc:creator><pubDate>Sun, 12 Feb 2017 17:25:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/KWcVEhPeHc23p3AuVFMbP7XppdzWRPUtKMumsTm9Xy7Qe2fykNAu8zRSyKDxDw99oDEHTm2fBwsEukeTLz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Get vulnerable websites for hacking - Video]]></title><link>http://direct.ecency.com/hacked/@ammadkhalid/get-vulnerable-websites-for-hacking-video</link><guid isPermaLink="true">http://direct.ecency.com/hacked/@ammadkhalid/get-vulnerable-websites-for-hacking-video</guid><category><![CDATA[hacked]]></category><dc:creator><![CDATA[ammadkhalid]]></dc:creator><pubDate>Wed, 08 Feb 2017 11:19:00 GMT</pubDate></item><item><title><![CDATA[Google Dork (SQLI) To Find Vulnerable Websites For Hacking]]></title><description><![CDATA[Google Dork (SQLI) To Find Vulnerable Websites for Hacking Hello guys today i will show you how we can get websites for hacking :) Simply we can google dorks for finding vulnerable websites like this one:]]></description><link>http://direct.ecency.com/hacked/@ammadkhalid/google-dork-sqli-to-find-vulnerable-websites-for-hacking</link><guid isPermaLink="true">http://direct.ecency.com/hacked/@ammadkhalid/google-dork-sqli-to-find-vulnerable-websites-for-hacking</guid><category><![CDATA[hacked]]></category><dc:creator><![CDATA[ammadkhalid]]></dc:creator><pubDate>Sat, 04 Feb 2017 19:24:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961VvMGCmUehLThVKc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[RCE (Remote Code Execution) - (Most Common Websites Vulnerabilities)]]></title><description><![CDATA[remote code execution (RCE) Another Name of RCE is also called arbitrary code execution.Which is used to describe an attacker's ability to execute any command of the attacker's choice on a target machine]]></description><link>http://direct.ecency.com/hacked/@ammadkhalid/rce-remote-code-execution-most-common-websites-vulnerabilities</link><guid isPermaLink="true">http://direct.ecency.com/hacked/@ammadkhalid/rce-remote-code-execution-most-common-websites-vulnerabilities</guid><category><![CDATA[hacked]]></category><dc:creator><![CDATA[ammadkhalid]]></dc:creator><pubDate>Mon, 30 Jan 2017 16:18:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQbWfyWo6W2J7TB5cPDzs1F34U8PYrEShqa5fufrDpHEgtesoucjeroXZttJ8yYp9YZ8MwF3KDAvS2rdnFikmjJavWiJgqiQFrcoaEXXuYJB25S6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cross-Site Request Forgery (CSRF) | (Most Common Vulnerabilities to Hack Websites)]]></title><description><![CDATA[Cross-Site Request Forgery (CSRF) | (Most Common Vulnerabilities to Hack Websites) Today i will explain another way of how hackers hack people accounts but first let's what is CSRF? Cross-Site Request]]></description><link>http://direct.ecency.com/hacked/@ammadkhalid/cross-site-request-forgery-csrf-or-most-common-vulnerabilities-to-hack-websites</link><guid isPermaLink="true">http://direct.ecency.com/hacked/@ammadkhalid/cross-site-request-forgery-csrf-or-most-common-vulnerabilities-to-hack-websites</guid><category><![CDATA[hacked]]></category><dc:creator><![CDATA[ammadkhalid]]></dc:creator><pubDate>Sat, 28 Jan 2017 09:39:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/x7L2VSNEiyAJGtud3yLTYqEboHShHzKgzVuXKMkzLaGc3QiCEzcFU2Fg9EqCoqu19nifCbKibdGNZF4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Broken Authentication and Session Management (Most Common Vulnerabilities to Hack Websites)]]></title><description><![CDATA[Broken Authentication and Session Management - Common Vulnerability to Hack Website Today i will told you about one of the most common Vulnerability to Hack websites .But first let me told you THIS IS]]></description><link>http://direct.ecency.com/hacked/@ammadkhalid/broken-authentication-and-session-management-most-common-vulnerabilities-to-hack-websites</link><guid isPermaLink="true">http://direct.ecency.com/hacked/@ammadkhalid/broken-authentication-and-session-management-most-common-vulnerabilities-to-hack-websites</guid><category><![CDATA[hacked]]></category><dc:creator><![CDATA[ammadkhalid]]></dc:creator><pubDate>Thu, 26 Jan 2017 14:14:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/B69zEhWZA8UCieiQ4cpnuU1D7Nn3wKm7G8fvwK4cKf2Y4yT3nyVDJL3ZKbWvGygQVM86Z6WkfqdHPbxzvCm9GF6KpxHjTGx7bkGidc6A?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What is XSS (Website vulnerability)]]></title><description><![CDATA[What is XSS (Cross Site Scripting) Cross-site scripting (XSS) is an injection attack which is carried out on Web applications that accept input, but do not properly separate data and executable code before]]></description><link>http://direct.ecency.com/webhacking/@ammadkhalid/what-is-xss-website-vulnerability</link><guid isPermaLink="true">http://direct.ecency.com/webhacking/@ammadkhalid/what-is-xss-website-vulnerability</guid><category><![CDATA[webhacking]]></category><dc:creator><![CDATA[ammadkhalid]]></dc:creator><pubDate>Tue, 24 Jan 2017 20:36:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgGXrYizHEgrgKnVLa8bd4tPRunnn3ZJAGRaPG8kYYo9ACoHMLxKo43JQNmuBwJa6si4KLw3NcM4Rok7P2A4X6vqU8q964uLexFq8jse28p242dVdeimm8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What is SQL INJECTION (Website vulnerability)]]></title><description><![CDATA[What is SQL INJECTION An attack technique used to exploit web sites by altering backend SQL statements through manipulating application input. SQL Injection happens when a developer accepts user input]]></description><link>http://direct.ecency.com/webhacking/@ammadkhalid/what-is-sql-injection-website-vulnerability</link><guid isPermaLink="true">http://direct.ecency.com/webhacking/@ammadkhalid/what-is-sql-injection-website-vulnerability</guid><category><![CDATA[webhacking]]></category><dc:creator><![CDATA[ammadkhalid]]></dc:creator><pubDate>Tue, 24 Jan 2017 20:26:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/82kPqoBYiyUvqzXnYEb4WVsou1zDhoNsgLnh7US4CsNY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How did Websites get hacked?]]></title><description><![CDATA[How did hackers hack websites? Today i'm gonna told you about how did hackers hack websites. Hackers acually found a bug (vulnerability) (Like SQL Injection,XSS,RCE) and try to exploit it. According to]]></description><link>http://direct.ecency.com/hacked/@ammadkhalid/how-did-websites-get-hacked</link><guid isPermaLink="true">http://direct.ecency.com/hacked/@ammadkhalid/how-did-websites-get-hacked</guid><category><![CDATA[hacked]]></category><dc:creator><![CDATA[ammadkhalid]]></dc:creator><pubDate>Tue, 24 Jan 2017 20:18:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/26uUsAdz924ifPF5fwjXWEt3DxV3J7vjNBokqXLJXU9yuAuBUvaM17PqnKQzYzsFxoMmT4p8BYsUpQrQiHnkpioSrathJBivT2D7VLPp8VPjffeqA6RTvBm7EvXtUvB8r7nvn2SvPN23hBMPn8XgE878Thh7vkCT4mdbiN?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>