Marcin WolakHiring Ethical Hackers in 2024Finding highly skilled ethical hackers and penetrations testers has in the recent years become very challenging. Remote work & education…3d ago2
BaraninRadio HackersPwnagotchi: A Virtual Pet That Eats Wi-Fi Handshakes As TreatsIn this article I will give you some information about my Pwnagotchi, an A2C based virtual pet running on a Raspberry Pi Zero W system…May 24
Spider4Email verification bypass due to race condition.One day, I decided to hunt on a security services company’s public program with a limited scope. In the past, I hesitated with public…4d ago34d ago3
Milad keivanfarQuick Guide: API Penetration TestingHello to all penetration tester. this guide is designed to help penetration testers understand the process of API penetration testing…9h ago9h ago
Ahmed TarekIDOR leads to Account Takeover of all users (ATO).Hello everyone , I’m Ahmed Tarek, Today I would like to share with you my second IDOR discovery in HackerOne ’s program, This is my 1st…Apr 2815Apr 2815
Marcin WolakHiring Ethical Hackers in 2024Finding highly skilled ethical hackers and penetrations testers has in the recent years become very challenging. Remote work & education…3d ago2
BaraninRadio HackersPwnagotchi: A Virtual Pet That Eats Wi-Fi Handshakes As TreatsIn this article I will give you some information about my Pwnagotchi, an A2C based virtual pet running on a Raspberry Pi Zero W system…May 24
Spider4Email verification bypass due to race condition.One day, I decided to hunt on a security services company’s public program with a limited scope. In the past, I hesitated with public…4d ago3
Milad keivanfarQuick Guide: API Penetration TestingHello to all penetration tester. this guide is designed to help penetration testers understand the process of API penetration testing…9h ago
Ahmed TarekIDOR leads to Account Takeover of all users (ATO).Hello everyone , I’m Ahmed Tarek, Today I would like to share with you my second IDOR discovery in HackerOne ’s program, This is my 1st…Apr 2815
Sourav KalalElectron JS ASAR Integrity BypassI recently created an Electron JS-based Windows and MacOS application. The newer version of Electron has Integrity detection which…Jul 19
Vasileiadis A. (CyberKid)Autopsy Digital Forensics: Recover Deleted FilesAutopsy: As you know, files that are “deleted” remain on the storage medium until they are replaced. Deleting these files simply makes the…11h ago