PinnedPublished inT3CHBug Bounty Hunting: Web Vulnerability (Remote Code Execution)Mastering RCE: Techniques, Bypasses, and ExploitsFeb 131Feb 131
PinnedIT Risk Management in the Banking SectorMy First Month as an IT Risk Management OfficerJan 21Jan 21
PinnedCybersecurity: Careers, Skills, and OpportunitiesThis article is intended for those who have Little or no experience with cybersecurity.Oct 31, 2022Oct 31, 2022
PinnedBeyond Google’s Reach: 27 Must-Visit Dark Web sites in 2023!In the realm of the internet lies a hidden world beyond the reach of standard search engines — a space known as the dark web. Here, we…Nov 24, 2023Nov 24, 2023
Cracking Linux Password HashesA Comprehensive Guide to John the Ripper, Hashcat, and Other ToolsFeb 281Feb 281
The Web Application Hacker’s Handbook: Web Application (In)securityDiscovering and Exploiting Security FlawsFeb 19Feb 19
Bug Bounty Hunting: Automatic Vulnerability Discovery Using FuzzersComprehensive Guide for Bug HuntersFeb 16Feb 16
Bug Bounty Hunting: Web Vulnerability (API Testing)API Testing: Techniques, Bypasses, and ExploitsFeb 16Feb 16
Bug Bounty Hunting: Web Vulnerability (Android Hacking Apps)Android Hacking Apps: Techniques, Bypasses, and ExploitsFeb 16Feb 16
Bug Bounty Hunting: Web Vulnerability (Secure Code Review)A Guide for Developers and Security ProfessionalsFeb 14Feb 14
Bug Bounty Hunting: Web Vulnerability (Information Disclosure)Mastering ID: Techniques, Bypasses, and ExploitsFeb 14Feb 14
Bug Bounty Hunting: Web Vulnerability (Single Sign-On services)Mastering SSS: Techniques, Bypasses, and ExploitsFeb 14Feb 14
Bug Bounty Hunting: Web Vulnerability (Same-Origin Policy)Mastering SOP: Techniques, Bypasses, and ExploitsFeb 13Feb 13
Bug Bounty Hunting: Web Vulnerability (Application Logic Errors and Broken Access Control)Techniques, Bypasses, and ExploitsFeb 13Feb 13