PinnedPublished inT3CHBug Bounty Hunting: Web Vulnerability (Remote Code Execution)Mastering RCE: Techniques, Bypasses, and ExploitsFeb 131Feb 131
PinnedIT Risk Management in the Banking SectorMy First Month as an IT Risk Management OfficerJan 21Jan 21
PinnedCybersecurity: Careers, Skills, and OpportunitiesThis article is intended for those who have Little or no experience with cybersecurity.Oct 31, 2022Oct 31, 2022
PinnedBeyond Google’s Reach: 27 Must-Visit Dark Web sites in 2023!In the realm of the internet lies a hidden world beyond the reach of standard search engines — a space known as the dark web. Here, we…Nov 24, 2023Nov 24, 2023
Published inInfoSec Write-upsCracking Linux Password HashesA Comprehensive Guide to John the Ripper, Hashcat, and Other ToolsFeb 281Feb 281