iamrizwanvpHow I Escalated N/A to High and Got Rewarded $$$: Bug Hunting JourneyEscalating Clickjacking to Cross site scripting1d ago1
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 112
PamC/FLYINGMUM7 open source security tools too good to ignoreThese must-have open-source tools help CISOs and their teams scan for vulnerabilities, analyze protocols, run forensics, and support threat…Jul 72Jul 72
Osama HusseinWriteups for — CyberTalents Penetration Testing Internship Program 2024 [CTF]بسم الله الرحمن الرحيم7h ago7h ago
Marcin WolakHiring Ethical Hackers in 2024Finding highly skilled ethical hackers and penetrations testers has in the recent years become very challenging. Remote work & education…Jul 233Jul 233
iamrizwanvpHow I Escalated N/A to High and Got Rewarded $$$: Bug Hunting JourneyEscalating Clickjacking to Cross site scripting1d ago1
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 112
PamC/FLYINGMUM7 open source security tools too good to ignoreThese must-have open-source tools help CISOs and their teams scan for vulnerabilities, analyze protocols, run forensics, and support threat…Jul 72
Osama HusseinWriteups for — CyberTalents Penetration Testing Internship Program 2024 [CTF]بسم الله الرحمن الرحيم7h ago
Marcin WolakHiring Ethical Hackers in 2024Finding highly skilled ethical hackers and penetrations testers has in the recent years become very challenging. Remote work & education…Jul 233
khanam00HTB: GREENHORN WALKTHROUGHHello, my fellow HTB enthusiasts! Are you ready to capture some flags with me?!?!2d ago1
Vishal BarotHunting for Vulnerabilities that are ignored by most of the Bug Bounty Hunters — Part 2Hi Guys,Jul 281