InInfoSec Write-upsbyTuhin BoseLog4shell Zero-Day Exploit— Full GuideHello guys! My name is Tuhin Bose (@tuhin1729). I am a cyber security researcher and bug bounty hunter. In this write-up, I am going to…Dec 14, 20215Dec 14, 20215
InInfoSec Write-upsbyVickie LiBeginner’s Guide to CTFsHow To Start With Security Capture The Flag CompetitionsMar 19, 20201Mar 19, 20201
InInfoSec Write-upsbyThexssratHow i passed my OSCP exam first try with no prior hacking experienceIntroductionJun 4, 20212Jun 4, 20212
Arnav TripathyMy eJPT experience :The elearning certifications are growing in terms of popularity and as such I enrolled myself in the eJPT certification as I promised…Sep 5, 20195Sep 5, 20195
Harsh BothraHow do I get Started in Cyber Security? — My Perspective & Learning Path!Cyber Security, Ethical Hacking, Application Security, Penetration Testing, Bug Bounties, etc., these career options are blooming and…Mar 6, 202123Mar 6, 202123
Shambhavi ShandilyaLinux commands to have fun on TerminalThe Linux command line is not only a place for complex and powerful commands but also a fun playground. In this article, I have compiled a…Jan 16, 202218Jan 16, 202218
Gnana Aravind KUSB Rubber Ducky with ArduinoHi everyone in this article , am going to talk about making a hardware hacking device for just 4 $ (300 RS). So lets get started.Feb 1, 2022Feb 1, 2022
InInfoSec Write-upsbyArav BudhirajaeJPT as a 14 year oldHello! My name is Arav Budhiraja, a 15-year-old from India. Since the onset of the covid-19 pandemic, I gained an interest in the field of…Jun 29, 20212Jun 29, 20212
Mike BondCertification: eJPTI successfully passed the eJPT (eLearnSecurity Junior Penetration Tester) certification (June 2018) and wanted to provide feedback on my…Jun 24, 20185Jun 24, 20185
InInfoSec Write-upsbyMayur ParmarUltimate Guide to pass eJPT in the first attempt by Mayur ParmarCourse: eJPT(eLearnSecurity Junior Penetration Tester)Apr 16, 20217Apr 16, 20217
Vickie LiBest Hacker and Security Blogs to ReadPlease accept my eternal gratitude and creepy fangirling on twitter.Jun 15, 20194Jun 15, 20194
ThexssratResources to help make you a better hackerA curated list of several resources out there to help you form into the amazing hacker you are!Oct 10, 20211Oct 10, 20211
Hanisha Arora5 mistakes a newbie hacker makesWelcome back to the roadmap. How is it going? It’s time to discuss avoiding mistakes a hacker makes while learning. Hope you have completed…Oct 10, 2021Oct 10, 2021
Hanisha AroraThe 5-Minute, 5-Step ways to exploit SMTPThe secret I’m going to tell you about is — “Control is an illusion”. The topic( SMTP exploit) will also convince you on agreeing to this…Nov 22, 20211Nov 22, 20211
MikeChanLinux Tricks for Bug Bounty HunterIn previous post, we discussed about how to setup a Recon Machine on VPS and how to use Screen to maintain your recon process even after…Nov 20, 20211Nov 20, 20211
InInfoSec Write-upsbyFebi MudiyantoMake a USB Rubber Ducky with less than $3USB Rubber Ducky is like USB flash drive, but it’s different. Because it will inject keystrokes with some payload to hack your computer…Jan 8, 20224Jan 8, 20224
InInfoSec Write-upsbyGourav DharHow I created a Trojan Malware — Ethical HackingTrojan malware, when opened appears to be a legitimate file, but in the background, it will run some evil process like gaining access etc.Mar 9, 20228Mar 9, 20228
RavaanCybersecurity Bible: The 5 rules for every beginner.I have come a long way in cybersecurity. Here’s why I'm eligible for writing this, I have faced every problem, had sleepless nights, and…Mar 13, 20227Mar 13, 20227