George JosephinSystem WeaknessHow I Exploited IDOR in an Encrypted Mobile API with FridaDiscover how a deep dive into static code analysis and dynamic instrumentation with Frida revealed an IDOR vulnerability.Jun 20
Ott3rlyinInfoSec Write-upsPort Scanning for Bug BountiesAre you using the same port scanning techniques as everybody else and not getting desirable results? It’s time to change your approach!Apr 224
Zeki JusufoskiHow to Detect Phishing AttacksEssential Phishing Detection Techniques pen_sparkMay 19May 19
Elizabeth EkedoroHOW I PASSED THE BLUE TEAM LEVEL 1 (BTL1) EXAM EARNING THE RARE GOLD COIN ON MY FIRST ATTEMPTA Screenshot of my exam score.Feb 251Feb 251
Zeki JusufoskiTypes of Computer Security ThreatsThe Digital Dangers You Need to Know AboutMay 13May 13
George JosephinSystem WeaknessHow I Exploited IDOR in an Encrypted Mobile API with FridaDiscover how a deep dive into static code analysis and dynamic instrumentation with Frida revealed an IDOR vulnerability.Jun 20
Ott3rlyinInfoSec Write-upsPort Scanning for Bug BountiesAre you using the same port scanning techniques as everybody else and not getting desirable results? It’s time to change your approach!Apr 224
Elizabeth EkedoroHOW I PASSED THE BLUE TEAM LEVEL 1 (BTL1) EXAM EARNING THE RARE GOLD COIN ON MY FIRST ATTEMPTA Screenshot of my exam score.Feb 251
Efam HarrisHow to Install Wazuh Agent on Windows for Your Home LabWazuh is an excellent tool for the beginner’s home lab because it’s FREE, unlike other tools requiring paid subscriptions.Apr 71
BytesofinfosecinSystem WeaknessSafeguarding Networks: A Comprehensive Look at Intrusion Prevention Systems (IPS)IntroductionApr 23