Lakin MohapatraSearch Engines for Penetration TestersWhen you’re performing penetration testing, reconnaissance is one of the key phases that can make or break your approach. This process of…10h ago
Vasileiadis A. (CyberKid)Protect your WiFi from HackersWi-Fi Hacking is much easier than most people think and the way to achieve it is some common techniques that most hackers use. With a few…Aug 2911
Satyam PathaniainInfoSec Write-upsSecret Linux Commands: The Ones Your Teacher Never Told You Aboutoh yeah — I m your teacher ggSep 2016Sep 2016
OmdubeyBroken Access Control Vulnerability in an Order Management SystemVulnerability Overview I found a BrokenAccess Control vulnerability in the API handling basket operations. The issue is that these API…1d ago1d ago
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 112Jun 112
Lakin MohapatraSearch Engines for Penetration TestersWhen you’re performing penetration testing, reconnaissance is one of the key phases that can make or break your approach. This process of…10h ago
Vasileiadis A. (CyberKid)Protect your WiFi from HackersWi-Fi Hacking is much easier than most people think and the way to achieve it is some common techniques that most hackers use. With a few…Aug 2911
Satyam PathaniainInfoSec Write-upsSecret Linux Commands: The Ones Your Teacher Never Told You Aboutoh yeah — I m your teacher ggSep 2016
OmdubeyBroken Access Control Vulnerability in an Order Management SystemVulnerability Overview I found a BrokenAccess Control vulnerability in the API handling basket operations. The issue is that these API…1d ago
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 112
1dayHow I Hacked Into a Nationwide University Database System Exposing Thousands of Student RecordsINTRODUCTIONSep 2215
Mrutunjaya SenapatiUnderstanding Server-Side Request Forgery (SSRF): A Critical Web VulnerabilityIn the realm of web security, understanding vulnerabilities is crucial for protecting applications and sensitive data. Server-Side Request…4h ago
Vivek NaskarinLevel Up CodingHow One Developer Accidentally Stopped the World’s Most Dangerous HackEverything you need to know about the most dangerous hack that was about to happen, but luckily got discovered.Apr 916