Mohammad Awab Hassan NizamiPractical Bug Bounty — TCM Academy | Module 6Module 6 — Authorization Attacks6d ago6d ago
Mohammad Awab Hassan NizamiPractical Bug Bounty — TCM Academy | Module 5Module 5 — Reconnaissance and Information GatheringJul 11Jul 11
Mohammad Awab Hassan NizamiPractical Bug Bounty — TCM Academy | Module 2,3,4Module 2 — Before We Attack (Preparation)Jul 8Jul 8
Mohammad Awab Hassan NizamiPractical Bug Bounty — TCM Academy | Module 1Module 1 — Web Application SecurityJul 7Jul 7
Mohammad Awab Hassan NizamiBasics of Active Reconnaissance — Offensive Security UnfoldedActive ReconnaissanceJun 29Jun 29
Mohammad Awab Hassan NizamiBasics of Passive Reconaissance — Offensive Security Unfolded.Passive ReconnaissanceJun 27Jun 27
Mohammad Awab Hassan NizamiBASICS OF WINDOWS FOR PENTESTERS — Offensive Security unfoldedBasic commands:Jun 25Jun 25
Mohammad Awab Hassan NizamiTheoretical Basics Of Penetration Testing — Offensive Security Unfolded Module 1.How can hacking be good?Jun 24Jun 24
Mohammad Awab Hassan NizamiIntroduction to Networking (Devops | Pentesting) Part-1 OSI ModelLearning the basics of networking is very important, I as a devops engineer, ignored learning networking which made alot of things very…Jun 22Jun 22
Mohammad Awab Hassan NizamiWeb pentest methodology: 5. Automated Testing — journey of web application pentesting.Automated Attacks — OWASP Juice Shop.Sep 13, 2023Sep 13, 2023