JAI NIRESH JIDORS — leaking 1.5 crore user detailsHey fellas, After a lot of people DMs, Methodology requests, and ton of emails, i finally decided to write up the methodologies on my…11h ago1
Jacob BartlettinLevel Up CodingJailbreak your Enemies with a Link: Remote Execution on iOSThe Trident Exploit Chain deep-diveSep 1624
Sathyaprakash SahooinInfoSec Write-upsHere’s Why I Don’t Suggest People to Get into CybersecurityWhat Most Won’t Tell You About a Career in CybersecuritySep 1013Sep 1013
Theori Security AssessmentinTheori BLOGWinning the AIxCC Qualification RoundIn August, Theori’s CTF team, as part of the Maple Mallard Magistrates, won Defcon CTF for the 3rd year in a row–the first team ever to do…1d ago1d ago
Linda MargaretinBrain LabsConsidering a Career in Cybersecurity? Watch Battlestar Galactica First.Why will the series prepare you for the science and then some?Sep 187Sep 187
JAI NIRESH JIDORS — leaking 1.5 crore user detailsHey fellas, After a lot of people DMs, Methodology requests, and ton of emails, i finally decided to write up the methodologies on my…11h ago1
Jacob BartlettinLevel Up CodingJailbreak your Enemies with a Link: Remote Execution on iOSThe Trident Exploit Chain deep-diveSep 1624
Sathyaprakash SahooinInfoSec Write-upsHere’s Why I Don’t Suggest People to Get into CybersecurityWhat Most Won’t Tell You About a Career in CybersecuritySep 1013
Theori Security AssessmentinTheori BLOGWinning the AIxCC Qualification RoundIn August, Theori’s CTF team, as part of the Maple Mallard Magistrates, won Defcon CTF for the 3rd year in a row–the first team ever to do…1d ago
Linda MargaretinBrain LabsConsidering a Career in Cybersecurity? Watch Battlestar Galactica First.Why will the series prepare you for the science and then some?Sep 187
Ilias MavropoulosinInfoSec Write-upsThe Ultimate Guide / CheatSheet to Flipper ZeroUnlock the Full Potential of Flipper Zero: From Basics to Advanced Hacking TechniquesJan 1610
HarrmaharPurchasing Golden Number at a Lower Price: A $800 Bounty StoryIn this article, I will share a vulnerability that biidznillah I found several months ago in a private bug bounty program where there is a…1d ago1
Ofir YakovianinInfoSec Write-upsLarge-Scale Data Exfiltration: Exploiting Secrets in .env Files to Compromise Cloud AccountsPart 1: A comprehensive analysis of the techniques used by attackers in this malicious operationSep 112