Join Our Telegram GroupsTelegram

Pinned Post

Latest Posts

hacker story - my name is Illusion

Hello, my name is Illusion , and I am a figment of every hacker's imagination. As hackers, we often feel invincible, believing that we can contr…

Top 10 Cloud Security Open Source Tools in 2023

According to statistics, 83% of enterprises and organizations save costs and improve efficiency by "going to the cloud", but cloud securit…

owasp top 10 for bug bounty hunter

OWASP Top 10 OWASP Top 10 The OWASP Top 10 is a list of the most critical web application security risks, as identified by the …

Difference Between Hashing and Encryption

Encryption and hashing are two terms widely used in cryptography. In this article, we will understand the difference between encryption and hashing…

what is The difference between NoSQL and NewSQL

1. NoSQL The term NoSQL classifies databases as descriptive, like "No-SQL". NoSQL is a comprehensive category of databases designed to ov…

API security tools and resources awesome api security

API Keys: Find and Verify name Description API Guesser Muhammad Daffa's Simple Website to Guess API Keys/OAuth Tokens API key leaks: tools and …