Published in


Hacking APIs: Types and Architectures

Understanding APIs and their weaknesses

Application Programming Interfaces (APIs) are quickly becoming a point of concern amongst cybersecurity professionals. As organizations continue to expand the interoperability and coordination with each other and as companies make the move to…




Everything connected with Tech & Code. Follow to join our 900K+ monthly readers

Recommended from Medium

Minimizing Failure before the “Network Failure”, TheBugBounty way

Crypto Comics — What is Plagiarism in Web3

EST Contracts Are Live On Fantom

{UPDATE} Football Words Hack Free Resources Generator

Transparency Report: Breakdown of Second Week Giveaway Distribution.

{UPDATE} Pocoyo Album Hack Free Resources Generator

{UPDATE} Word Connect ¤ Hack Free Resources Generator

Hack the Box Luke Walkthrough

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


No b*llshit Hacking tutorials with extreme value in short bursts

More from Medium

Introduction To Bash For System Administration and Bug Bounty Hunting

How “Docker” can help you become a better hacker

Evading Firewall/IDS during network reconnaissance using nmap

Portswigger File Upload — Lab 2