Ekene Joseph OnyeagusiSpiderFoot: Unleash the Ultimate OSINT Powerhouse on Kali LinuxIf you’re exploring tools for Open Source Intelligence (OSINT), SpiderFoot is a must-have addition to your arsenal. Available on Kali…2d ago
InThe Deep HubbyAlimuhammadsecuredHow 12-year-olds hack thousands of accounts a dayDuring the COVID-19 era many teens were locked inside of their homes and addicted to video games started downloading cheats and buying…Jun 147
Firas Al-KoussaMicrosoft IIS Server Shortnames & Tilde Magic 🪄From partial file and directory names to critical P1 reports.May 303May 303
KeployioThe Ultimate Guide to Penetration Testing Tools: Enhancing Cybersecurity in 2024Penetration testing, or pen testing, is a critical component of modern cybersecurity strategies. By simulating real-world attacks, pen…1d ago1d ago
InInfoSec Write-upsbyAbdul IssaA Beginner’s Guide to DNS Reconnaissance (Part 1)An introduction to DNS Enumeration Tools and TechniquesFeb 291Feb 291
Ekene Joseph OnyeagusiSpiderFoot: Unleash the Ultimate OSINT Powerhouse on Kali LinuxIf you’re exploring tools for Open Source Intelligence (OSINT), SpiderFoot is a must-have addition to your arsenal. Available on Kali…2d ago
InThe Deep HubbyAlimuhammadsecuredHow 12-year-olds hack thousands of accounts a dayDuring the COVID-19 era many teens were locked inside of their homes and addicted to video games started downloading cheats and buying…Jun 147
Firas Al-KoussaMicrosoft IIS Server Shortnames & Tilde Magic 🪄From partial file and directory names to critical P1 reports.May 303
KeployioThe Ultimate Guide to Penetration Testing Tools: Enhancing Cybersecurity in 2024Penetration testing, or pen testing, is a critical component of modern cybersecurity strategies. By simulating real-world attacks, pen…1d ago
InInfoSec Write-upsbyAbdul IssaA Beginner’s Guide to DNS Reconnaissance (Part 1)An introduction to DNS Enumeration Tools and TechniquesFeb 291
Ekene Joseph OnyeagusiUnderstanding the Impact of XSS Attacks on WebsitesCross-Site Scripting (XSS) is a pervasive and dangerous vulnerability that has plagued websites for decades. As a fundamental concern in…2d ago
InSystem WeaknessbySamxia99Red Teams vs. Penetration Testing Teams: Understanding Their Unique Roles in CybersecurityUncover the distinct roles of penetration testing and red teams, from identifying system vulnerabilities to simulating real-world…Nov 30