Sec-88
  • πŸ§‘Whoami
  • πŸ•ΈοΈWeb-AppSec
    • Features Abuse
      • 2FA
      • Ban Feature
      • CAPTCHA
      • Commenting
      • Contact us
      • File-Upload
      • Inviting Feature
      • Messaging Features
      • Money-Related Features
      • Newsletter
      • Profile - Settings
      • Registration
      • Reset Password
      • Review
      • Rich Editor/Text
      • Social Sharing
      • Billing-Shipping Address Management
      • Integrations - Webhooks
      • API Key Management
    • Reconnaissance
      • Attacking Organizations with big scopes
    • Subdomain Enumeration
    • Fingerprinting
    • Dorking
    • XSS-HTML Injection
    • Improper Authentication
      • JWT Security
    • OAUTH Misconfigurations
      • OAuth 2.0 Basics
      • OAUTH Misconfigurations
    • Auth0 Misconfigurations
    • Broken Access Control
      • Insecure Direct Object References (IDOR)
      • 403 Bypass
    • Broken Link Injection
    • Command Injection
    • CORS
    • CRLF
    • CSRF
    • Host Header Attacks
    • HTTP request smuggling
    • JSON Request Testing
    • LFI
      • LFI to RCE
    • No Rate Limit
    • Parameters Manual Testing
    • Open Redirect
    • Registration & Takeover Bugs
    • Remote Code Execution (RCE)
    • Session Fixation
    • SQL Injection
      • SQL To RCE
    • SSRF
    • SSTI
    • Subdomain Takeover
    • Web Caching Vulnerabilities
    • WebSockets
    • XXE
      • XXE to RCE
    • Cookie Based Attacks
    • CMS
      • AEM [Adobe CMS]
    • XSSI (Cross Site Script Inclusion)
    • NoSQL injection
    • Local VS Remote Session Fixation
    • Protection
      • Security Mechanisms for Websites
      • Cookie Flags
      • SameSite Cookie Restrictions
      • Same-origin policy (SOP)
      • CSP
    • Hacking IIS Applications
    • Dependency Confusion
    • Attacking Secondary Context
    • Hacking Web Sockets
    • IDN Homograph Attack
    • DNS Rebinding Attack
    • LLM Hacking Checklist
    • Bypass URL Filtration
    • Cross-Site Path Traversal (CSPT)
    • PostMessage Security
    • Prototype Pollution
      • Client-Side Prototype Pollution
      • Server-Side prototype pollution
    • Tools-Extensions-Bookmarks
    • WAF Bypassing Techniques
    • SSL/TLS Certificate Lifecycle
    • Serialization in .NET
    • Client-Side Attacks
      • JavaScript Analysis
    • Bug Bounty Platforms/Programs
  • βœ‰οΈAPI-Sec
    • GraphQL API Security Testing
      • The Basics
      • GraphQL Communication
      • Setting Up a Vulnerable GraphQL Server
      • GraphQL Hacking Tools
      • GraphQL Attack Surface
      • RECONNAISSANCE
      • GraphQL DOS
      • Information Disclosure
      • AUTHENTICATION AND AUTHORIZATION BYPASSES
      • Injection Vulnerabilities in GraphQL
      • REQUEST FORGERY AND HIJACKING
      • VULNERABILITIES, REPORTS AND EXPLOITS
      • GraphQL Hacking Checklist
    • API Recon
    • API Token Attacks
    • Broken Object Level Authorization (BOLA)
    • Broken Authentication
    • Evasive Maneuvers
    • Improper Assets Management
    • Mass Assignment Attacks
    • SSRF
    • Injection Vulnerabilities
    • Excessive Data Exposure
    • OWASP API TOP 10 MindMap
    • Scanning APIs with OWASP ZAP
  • πŸ“±Android-AppSec
    • Setup Android App Pentesting environment on Arch
    • Setup Android App Pentesting environment on Mac M4
    • Setup Android Pentesting Environment on Debian Linux
    • Android App Fundamentals
      • Android Architecture
      • Android Security Model
      • Android App Components
        • Intents
        • Pending Intents
    • Android App Components Security Cheatsheet
    • Android App Pentesting Checklist
    • How To Get APK file for application
    • ADB Commands
    • APK structure
    • Android Permissions
    • Exported Activity Hacking
    • BroadcastReceiver Hacking
    • Content Provider Hacking
    • Signing the APK
    • Reverse Engineering APK
    • Deep Links Hacking
    • Drozer Cheat Sheet
    • SMALI
      • SMALI Cheat Sheet
      • Smali Code Patching Guide
    • Intent Redirection Vulnerability
    • Janus Vulnerability (CVE-2017-13156)
    • Task Hijacking
    • Hacking Labs
      • Injured Android
      • Hacking the VulnWebView Lab
      • Hacking InsecureBankv2 App
    • Frida Cheat Sheet
  • πŸ“ΆNetwork-Sec
    • Networking Fundamentals
    • Open Ports Security Testing
    • Vulnerability Scanning
    • Client Side Attacks
    • Port Redirection and Tunneling
    • Password Attacks
    • Privilege Escalation [PrevEsc]
      • Linux Privilege Escalation
    • Buffer Overflow (BOF)
      • VulnServer
      • Sync Breez Enterprize
      • Crashed CTF
      • BOF for Linux
    • AV Evasion
    • Post Exploitation
      • File Transfer
      • Maintaining Access
      • Pivoting
      • Clean Up
    • Active Directory
      • Basic AD Pentesting
  • πŸ’»Desktop AppSec
    • Thin Client vs. Thick Client
  • ☁️Cloud Sec
    • Salesforce Hacking
      • Basics
      • Salesforce SAAS Apps Hacking
    • Firebase
    • S3 Buckets Misconfigurations
  • πŸ‘¨β€πŸ’»Programming
    • HTML
    • JavaScript (JS)
      • window.location object
    • Python
      • Python Tips
      • Set
        • SetMethods
    • JAVA
      • Java Essentials
      • Java Essentials Code Notes
      • Java OOP1
      • JAVA OOP Principles
        • Inheritance
        • Method Overriding
        • Abstract Class
        • Interface
        • polymorphism
        • Encapsulation
        • Composition
      • Java OOP Challenges
      • Exception Handling
    • Go
      • Go Syntax Tutorial in one file
      • Methods and Interfaces
      • Go Slices
      • Go Maps
      • Go Functions
      • Concurrency
      • Read Files
      • Write Files
      • Package
        • How to make personal Package
        • regexp Packages
        • Json
        • bufio
        • Time
      • Signals-Exit
      • Unit Testing
  • πŸ–₯️Operating Systems
    • Linux
      • Linux Commands
      • Tools
      • Linux File System
      • Bash Scripting guide
      • tmux
      • Git
      • Install Go tools from private repositories using GitHub PAT
    • VPS
    • Burp Suite
  • ✍️Write-Ups
    • Hunting Methodology
    • API BAC leads to PII Data Disclosure
    • Misconfigured OATUH leads to Pre-Account Takeover
    • Automating Bug Bounty with GitHub Actions
    • From Recon to Reward: My Bug Bounty Methodology when Hunting on Public Bug Bounty Programs
    • Exploring Subdomains: From Enumeration to Takeover Victory
    • 0-Click Account Takeover via Insecure Password Reset Feature
    • How a Simple Click Can Lead to Account Takeover: An OAuth Insecure Implementation Vulnerability
    • The Power Of IDOR even if it is unpredictable IDs
    • Unlocking the Weak Spot: Exploiting Insecure Password Reset Tokens
    • AI Under Siege: Discovering and Exploiting Vulnerabilities
    • Inside the Classroom: How We Hacked Our Way Past Authorization on a Leading EdTech Platform
    • How We Secured Our Client’s Platform Against Interaction-Free Account Thefts
    • Unchecked Privileges: The Hidden Risk of Role Escalation in Collaborative Platforms
    • Decoding Server Behavior: The Key to Mass Account Takeover
    • Exploiting JSON-Based CSRF: The Hidden Threat in Profile Management
    • How We Turned a Medium XSS into a High Bounty by Bypassing HttpOnly Cookie
Powered by GitBook
On this page

Was this helpful?

Edit on GitHub
  1. Programming
  2. JAVA

Java Essentials Code Notes

import java.util.Scanner;

public class HelloJava {
    public static void main(String[] args) {
        // Printing
        System.out.println("Hello World !!\nNew Line !!");

        // Variables
        int score = 6; // Declare and Initialize
        score = score + 1; // Update variable
        System.out.println("Your score: " + score); // Your score: 7

        double studentGrade = 88.8;
        String name = "Mosaad Sallam";
        System.out.println(name + " : " + studentGrade); // Mosaad Sallam : 88.8

        long views = 3_000_000_000L;
        float price = 50.99F;
        char answer = 'A';
        boolean isRaised = false;
        double result = 10 % 3; // 1

        int x = 1, y;
        y = ++x; // Postfix x=2 y=2 Score
        x += 2; // x = x + 2

        // Casting in JAVA
        long a = 5;
        int b = (int) a;
        System.out.println(b); // 5

        // Salary Program
        String salaryDetails =
                "Salary details :" +
                        "\n------------------" +
                        "\nYour base salary : " + a +
                        "\nTaxes : " + b +
                        "\nSalary after taxes : " + (x - y) +
                        "\nIncentive : " + score +
                        "\n--------------------" +
                        "\nNet salary : " + price;
        System.out.println(salaryDetails);

        // If-else Statement
        int number1 = 1;
        if (number1 > 0) {
            System.out.println("The number is positive.");
        } else {
            System.out.println("The number is not positive.");
        }
        System.out.println("Statement outside if...else block");

        // Operators
        // Arithmetic Operators
        int e = 12, f = 5;
        System.out.println("a + b = " + (e + f));
        System.out.println("a - b = " + (e - f));
        System.out.println("a * b = " + (e * f));
        System.out.println("a / b = " + (e / f));
        System.out.println("a % b = " + (e % f));

        // Assignment Operators
        int g = 4, lol;
        lol = g;
        System.out.println("Var using =: " + lol);
        lol += g;
        System.out.println("Var using +=: " + lol);
        lol *= g;
        System.out.println("Var using *=: " + lol);

        // Relational Operators
        int h = 7, j = 11;
        System.out.println("a is " + a + " and b is " + b);
        System.out.println(h == j); // false
        System.out.println(h != j); // true
        System.out.println(h > j);  // false
        System.out.println(h < j);  // true
        System.out.println(h >= j);  // false
        System.out.println(h <= j);  // true

        // Logical Operators
        System.out.println((5 > 3) && (8 > 5)); // true
        System.out.println((5 > 3) && (8 < 5)); // false
        System.out.println((5 < 3) || (8 > 5)); // true
        System.out.println((5 > 3) || (8 < 5)); // true
        System.out.println((5 < 3) || (8 < 5)); // false
        System.out.println(!(5 == 3)); // true
        System.out.println(!(5 > 3)); // false

        // Unary Operators
        int l = 12, z = 12;
        int result1, result2;
        System.out.println("Value of a: " + l);
        result1 = ++l;
        System.out.println("After increment: " + result1);
        System.out.println("Value of b: " + z);
        result2 = --z;
        System.out.println("After decrement: " + result2);

        // Java instanceof Operator
        String str = "Programiz";
        boolean isString;
        isString = str instanceof String;
        System.out.println("Is str an object of String? " + isString);

        // switch-case
        int num = 44;
        String size;
        switch (num) {
            case 29:
                size = "Small";
                break;
            case 42:
                size = "Medium";
                break;
            case 44:
                size = "Large";
                break;
            case 48:
                size = "Extra Large";
                break;
            default:
                size = "Unknown";
                break;
        }
        System.out.println("Size: " + size);

        // Getting Input
        Scanner input = new Scanner(System.in);
        System.out.print("Enter float: ");
        float myFloat = input.nextFloat();
        System.out.println("Float entered = " + myFloat);
        System.out.print("Enter double: ");
        double myDouble = input.nextDouble();
        System.out.println("Double entered = " + myDouble);
        System.out.print("Enter text: ");
        String myString = input.next();
        System.out.println("Text entered = " + myString);

        // Java Arrays
        String[] array = new String[100];
        double[] data;
        data = new double[10];
        double[] dataArray = new double[10];
        int[] ageArray = {12, 4, 5, 2, 5};  // Declare, Initialize, and Access
        System.out.println("Accessing Elements of Array:");
        for (int i = 0; i < ageArray.length; i++) {
            System.out.println("Element at index " + i + ": " + ageArray[i]);
        }

        // Compute Sum and Average of Array Elements
        int[] numbersArray = {2, -9, 0, 5, 12, -25, 22, 9, 8, 12};
        int sumArray = 0;
        double averageArray;
        for (int numArray : numbersArray) {
            sumArray += numArray;
        }
        int arrayLength = numbersArray.length;
        averageArray = ((double) sumArray / arrayLength);
        System.out.println("Sum = " + sumArray); // Sum = 36
        System.out.println("Average = " + averageArray); // Average = 3.6

        // Create a 2D array
        int[][] array2D = {
                {1, 2, 3},
                {4, 5, 6, 9},
                {7},
        };
        System.out.println("Length of row 1: " + array2D[0].length);
        System.out.println("Length of row 2: " + array2D[1].length);
        System.out.println("Length of row 3: " + array2D[2].length);

        // Copying arrays
        int[] numbersCopy = {1, 2, 3, 4, 5, 6};
        int[] positiveNumbers = numbersCopy.clone(); // Copying arrays
        for (int numCopy : positiveNumbers) {
            System.out.print(numCopy + ", ");
        }
    }
}
PreviousJava EssentialsNextJava OOP1

Last updated 1 year ago

Was this helpful?

πŸ‘¨β€πŸ’»