top of page
![](https://static.wixstatic.com/media/11062b_6a134fc09ea34833a17d295e295ab517f000.jpg/v1/fill/w_288,h_162,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/11062b_6a134fc09ea34833a17d295e295ab517f000.jpg)
Cyber Flaws
Don't be a victim
ABOUT US
![CEH-logo.jpg](https://static.wixstatic.com/media/e4005d_cf42b6a246e44c24bfeebf899f302a40~mv2.jpg/v1/fill/w_475,h_355,al_c,lg_1,q_80,enc_auto/CEH-logo.jpg)
Who are we ?
I am an EC-Council Certified Ethical Hacker, and currently worked on few invitational jobs.I will be writing the blogs on this site as "Sy$t3m_H4ck3r".
​
Here at Cyber Flaws we discuss at well renowned vulnerabilities and why they caused, what was the mistakes done by the programmers, what prevention should one take as a Programmer and as a naive user so.
​
Here we will also going to demonstrate different ways to do penetration testing over a web server and how to prevent those Vulnerabilities.
​
Here also discuss about the different tools used by the hackers and tools which can be used by a person in order to protect him/her form being a victim.
bottom of page