Published inInfoSec Write-upsWireless Penetration Testing (WPA-2 Cracking)In this article, I’ll discuss Wireless Penetration Testing and Cracking WPA-2 Protected Wifi. I will talk about two different methods that…May 16, 20221May 16, 20221
5 Awesome Linux appsIn this story, I’ll discuss my favorite Linux apps. I use Linux as my primary Operating System. In my daily life, I use some of the apps…Apr 10, 20222Apr 10, 20222
How I got my First Bounty (Open Redirect)I was trying to find a good program to hunt on Hackerone. Then, I found a program. let's call it example.com. I was testing every link and…Mar 27, 20223Mar 27, 20223