PinnedPublished inT3CHBug Bounty Hunting: Web Vulnerability (Remote Code Execution)Mastering RCE: Techniques, Bypasses, and ExploitsFeb 131Feb 131
PinnedIT Risk Management in the Banking SectorMy First Month as an IT Risk Management OfficerJan 21Jan 21
PinnedCybersecurity: Careers, Skills, and OpportunitiesThis article is intended for those who have Little or no experience with cybersecurity.Oct 31, 2022Oct 31, 2022
PinnedBeyond Google’s Reach: 27 Must-Visit Dark Web sites in 2023!In the realm of the internet lies a hidden world beyond the reach of standard search engines — a space known as the dark web. Here, we…Nov 24, 2023Nov 24, 2023
Published inInfoSec Write-upsCracking Linux Password HashesA Comprehensive Guide to John the Ripper, Hashcat, and Other ToolsFeb 281Feb 281
The Web Application Hacker’s Handbook: Web Application (In)securityDiscovering and Exploiting Security FlawsFeb 19Feb 19
Bug Bounty Hunting: Automatic Vulnerability Discovery Using FuzzersComprehensive Guide for Bug HuntersFeb 16Feb 16
Bug Bounty Hunting: Web Vulnerability (API Testing)API Testing: Techniques, Bypasses, and ExploitsFeb 16Feb 16
Bug Bounty Hunting: Web Vulnerability (Android Hacking Apps)Android Hacking Apps: Techniques, Bypasses, and ExploitsFeb 16Feb 16
Bug Bounty Hunting: Web Vulnerability (Secure Code Review)A Guide for Developers and Security ProfessionalsFeb 14Feb 14
Bug Bounty Hunting: Web Vulnerability (Information Disclosure)Mastering ID: Techniques, Bypasses, and ExploitsFeb 14Feb 14
Bug Bounty Hunting: Web Vulnerability (Single Sign-On services)Mastering SSS: Techniques, Bypasses, and ExploitsFeb 14Feb 14
Bug Bounty Hunting: Web Vulnerability (Same-Origin Policy)Mastering SOP: Techniques, Bypasses, and ExploitsFeb 13Feb 13
Bug Bounty Hunting: Web Vulnerability (Application Logic Errors and Broken Access Control)Techniques, Bypasses, and ExploitsFeb 13Feb 13