PinnedÁngel CortezinSystem WeaknessDjango Web-Framework vs Burp Suite ProxyThis is Part 1 of an on going series where we are going to build a web app using Python’s Django framework while simultaneously testing its…May 15, 2022May 15, 2022
PinnedÁngel CortezinPython in Plain EnglishHow to Investigating DLL Logs with PythonA guide on investigating DLL logs with Python.Feb 19, 20221Feb 19, 20221
PinnedÁngel CortezinPython in Plain EnglishNetwork Traffic Analysis with PythonHow you can use Python to analyze network traffic activity.Feb 3, 2022Feb 3, 2022
PinnedÁngel CortezWork Out Like a HackerYou’ve come across your biggest adversary yet, YOUR FITNESS! But you are not worried. You’ve found bugs in websites, exploited corporate…Jan 15, 20222Jan 15, 20222
PinnedÁngel CortezUnderstanding Web Fuzzing for Ethical HackingWebsites have unique addresses just like your home address known as a Uniform Resource Locator (URL). If multiple entities shared one…Jan 8, 2022Jan 8, 2022
Ángel CortezFile Upload VulnerabilityDid you know that when your application lets users upload files it opens itself to attacks that target other users, the server hosting the…Jan 22Jan 22
Ángel Cortezpdf payload%PDF-1.3 %öäüß 1 0 obj << /Type /Catalog /Pages 2 0 R /OpenAction 3 0 R >> endobj 4 0 obj << /Producer (Haru Free PDF Library 2.0.8) >>…Mar 2, 2023Mar 2, 2023
Ángel CortezHow I got a job as an Ethical Hacker without Certs or a College degreeJul 30, 20227Jul 30, 20227
Ángel CortezDiscovering Bluetooth Devices w/ PythonDo you turn your Bluetooth off when you are not using it? It’s a quick click to miss and you might think its not a big deal. However…Mar 24, 2022Mar 24, 2022