loading...
👋 Sign in for the ability sort posts by top and latest.

Getting Started with AppSec V3

Reactions 59
2 min read

Getting Started with AppSec V4

Reactions 25
2 min read

Use your Yubikey to its Fullest

Reactions 23 Comments 2
8 min read

#amaI'm 18 and I do systems security, Ask Me Anything!

Reactions 23 Comments 30
1 min read

Password Managers Are Too Difficult

Reactions 21 Comments 5
2 min read

How to create own threat intelligence platform with PHP, cURL and API

Reactions 18
3 min read

Safe Spaces & WoSEC

Reactions 18 Comments 3
3 min read

Stuffing of Credentials?

Reactions 16 Comments 6
3 min read

Building Secure REST API Services with Python

Reactions 16 Comments 2
4 min read

What Is Tor and Should We Use It?

Reactions 15 Comments 9
4 min read

Hacker Summer Camp 2019

Reactions 15
8 min read

The Web Application Hacker's Handbook

Reactions 15
2 min read

Effective Communication Security / Beyond 'Use Signal Use Tor'

Reactions 15 Comments 6
3 min read

Week 0: Security blog posts introduction

Reactions 13
2 min read

Hackers are using a bug in PHP7 to remotely hijack web servers

Reactions 13
2 min read

Week 2: Knowing the penetration testing steps

Reactions 12
4 min read

Bypassing GitHub's OAuth flow

Reactions 12
2 min read

the infosec mindset

Reactions 11
3 min read

The Case for Automatic Updates

Reactions 11 Comments 1
5 min read

OverTheWire Bandit Level 7 → Level 8 walk-through

Reactions 11
1 min read

Security Sprint: week 1 - My project and first studies

Reactions 11 Comments 1
1 min read

A tour through the OWASP Top 10

Reactions 10
1 min read

Hackitect series vol.2 - Open source cybersecurity zoo

Reactions 10
5 min read

DevSlopChat about securing web apps hosted in Azure Storage

Reactions 9
2 min read

Two-minute InfoSec — Shell History Timestamps

Reactions 9
2 min read

Day-1: Understanding Base64

Reactions 9 Comments 1
2 min read

Developers need to stop fearing the InfoSec Mafia

Reactions 9
1 min read

Day-7: Nmap -- Hacker's Favourite Scanning Tool!

Reactions 8 Comments 2
2 min read

XSS and SQLi Polyglot Payloads

Reactions 8
3 min read

Security Testing: Fighting against bots

Reactions 8
3 min read

Practical Privacy: A Guide for Everyone

Reactions 8
1 min read

Shall We Begin? >:-)

Reactions 7
2 min read

Gradual Security Claims

Reactions 7
3 min read

Introducing Kubernetes Goat

Reactions 7
3 min read

How to Check a Sketchy Link Without Clicking It

Reactions 7
4 min read

SELinux and AppArmor

Reactions 7
3 min read

Question about topic

Reactions 7 Comments 7
1 min read

#discussRaising security awareness with a CTF competition... did you already participate in one, how it was?

Reactions 7
1 min read

Engaging in OverTheWire's Wargames

Reactions 7 Comments 1
3 min read

Week 1: Being conscious about your attack surface

Reactions 7
5 min read

ScamBaiting Vs HackTheBox

Reactions 7
4 min read

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Reactions 6
2 min read

This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

Reactions 6 Comments 5
2 min read

Attackers exploit 0day vulnerability that gives full control of Android phones

Reactions 6 Comments 2
2 min read

Phishing my company. An infosec lesson for businesses

Reactions 6 Comments 1
5 min read

Day-11: Read Info-sec Write-Ups!

Reactions 6
1 min read

Google and Samsung Fix Android Flaw that Allowed to Hijack your Camera and Audio to Spy on You

Reactions 6
3 min read

Security Champion

Reactions 6
2 min read

OverTheWire Bandit Level 6 → Level 7 walk-through

Reactions 6
2 min read

OverTheWire Bandit Level 0 walk-through

Reactions 6
1 min read

BSides Cymru Writeup - My Thoughts

Reactions 6
4 min read

OverTheWire Bandit Level 5 → Level 6 walk-through

Reactions 6
2 min read

Presentations I would love to watch

Reactions 6
2 min read

Day-3: Bypassing the SOP!💣

Reactions 5
2 min read

OverTheWire Bandit Level 3 → Level 4 walk-through

Reactions 5
1 min read

OverTheWire Bandit Level 0 → Level 1 walk-through

Reactions 5
1 min read

OverTheWire Bandit Level 2 → Level 3 walk-through

Reactions 5
1 min read

Covert Channels and Data Exfiltration

Reactions 5
9 min read

Isolate Your Games, Seriously

Reactions 5
4 min read

OverTheWire Bandit Level 1 → Level 2 walk-through

Reactions 5
2 min read
loading...