Homepage
Open in app
Sign in
Get started
Bug Bounty Hunting
Simple Hacking Explained!
About Us
CTF Writeups
Follow
How I tricked ChatGPT to act as a “person interviewing for CTO position” and write real malware…
How I tricked ChatGPT to act as a “person interviewing for CTO position” and write real malware…
Prompt injection Technique
Ronnie Joseph
Oct 10
Security Code Review of Race Condition bug in Python
Security Code Review of Race Condition bug in Python
Race condition bugs are some of the most overlooked issues during software development. One of the best exploits using this is to gain…
Ronnie Joseph
Aug 20
Netlas Recon Automation with Nuclei: Neuro
Netlas Recon Automation with Nuclei: Neuro
Netlas is a very new tool providing variety of services like IP WHOIS search, DNS search, attack surface discovery, Certificate Search…
Ronnie Joseph
Nov 7, 2023
Automating Port Knocking with Knockd Shellscript wrapper
In today’s interconnected world, ensuring the security of your servers and networks is paramount. One often-overlooked security measure is…
Ronnie Joseph
Oct 29, 2023
Android Game Hacking
Android Game Hacking
Client and server side games
Ronnie Joseph
Oct 16, 2023
AWS Lambda script to delete Inactive Users
AWS Lambda script to delete Inactive Users
I was doing learning within AWS and playing around with AWS lambda functions. This particular lambda functions utilizes boto3 library to…
Ronnie Joseph
Feb 17, 2023
Microservices Security Best Practices
Microservices Security Best Practices
Top 10 best practices microservices architecture.
Ronnie Joseph
Aug 24, 2021
About Bug Bounty Hunting
Latest Stories
Archive
About Medium
Terms
Privacy
Teams