Loading...
Loading...
Loading...
11 months ago 783

Cyber Security Useful Links

Illusion
lazyhacker
2
1 year ago 665

my name is

Illusion
lazyhacker
0
11 months ago 727

Top 10 Phishing Tools

Phishing is a type of cyber attack where the attacker, masquerading as a trustworthy entit...

Illusion
lazyhacker
0
11 months ago 614

Make your python scripts accessible anywhere in yo...

Illusion
lazyhacker
0
11 months ago 1.9K

one-line web server

A pen tester can use a one-line web server to quickly set up a temporary testing environme...

Illusion
lazyhacker
0
11 months ago 1.4K

Exposing a local web service to the internet secur...

Illusion
lazyhacker
0
11 months ago 1.8K

Curl Command Cheat Sheet for Penetration Testing

Curl is a command-line tool for making HTTP requests. It is widely used for testing APIs,...

Illusion
lazyhacker
0
11 months ago 1.4K

find command CheatSheet

Illusion
lazyhacker
0
11 months ago 1.1K

One liner bug hunting tools

One-Liners tools for bug bounty

Godzilla
X0NE
0
11 months ago 1.2K

FFUF cheat sheet for penetration testers

ffuf (short for "Fuzz Faster U Fool") is a powerful and fast web fuzzer written in Go prog...

Godzilla
X0NE
0
11 months ago 933

Introduction to APIs: A Comprehensive Guide to Und...

Godzilla
X0NE
0
11 months ago 1.0K
0

CS cybersecurity crisis

Dee
Kend
11 months ago 1.2K
0

The golden Era of technology

Dee
Kend
11 months ago 934

Web Fundamentals: Understanding the Core Building...

Godzilla
X0NE
0
11 months ago 960

API Basics: Understanding SOAP vs. REST, URLs

API Basics: Understanding SOAP vs. REST, URLs, Resource Modeling, and Key Definitions

Godzilla
X0NE
0
11 months ago 1.0K

Understanding API Authentication: A Guide to Cooki...

Understanding API Authentication: A Guide to Cookie-Based, Token-Based, and Basic Authenti...

Godzilla
X0NE
0
10 months ago 1.2K

A very comprehensive penetration testing memo: inc...

Share with heart, just to give you the best learning tutorial If you think the article...

Illusion
lazyhacker
0
6 months ago 1.0K

Zphisher graphic extension

This is a plugin where you can see in real time the victims of your phishing campaign, you...

TheBAG819
Admin
0
6 months ago 881

Protect Yourself against Website Server Attacks

This guide will help you protect yourself against malicious and DDoS attacks on servers.

TheBAG819
Admin
0
6 months ago 1.2K

Virus and Social Engineering (part 1)

How Viruses Are Sent and how to Protect yourself

TheBAG819
Admin
0
6 months ago 761

Virus and Social Engineering (part 2)

How Viruses are sent via Social Engineering

TheBAG819
Admin
0
6 months ago 1.1K

Session or Cookie Hijacking

How session or cookie hijacking works and how to protect yourself

TheBAG819
Admin
0
5 months ago 801

DNS HIJACKING

TheBAG819
Admin
0
5 months ago 1.0K

DNS Spoofing Attacks

How DNS spoofing works and how to protect

TheBAG819
Admin
0
5 months ago 1.2K

Metasploit

TheBAG819
Admin
0
5 months ago 847

Nmap (Network Mapper )

TheBAG819
Admin
0
5 months ago 932

Burp Suite

TheBAG819
Admin
0
5 months ago 1.1K

Installing Kali Linux on Android without Root

TheBAG819
Admin
0
3 months ago 930

How Computer Viruses Operate

Understanding the Basics

xone
xone
0
3 months ago 778

Awkward HTB Writeup | HacktheBox

OS : Linux. Difficulty Level : Medium.

xone
xone
0