Home
π”©π”¬π” π”žπ”© π”₯𝔬𝔰𝔱
Cancel

front-page port 80-shoopyuUnlock Your Cybersecurity Career with TryHackMe's New Security Engineer Learning Path πŸ›‘οΈ

Introduction: In today’s digital age, cybersecurity is more critical than ever. As the world becomes increasingly interconnected, the demand for skilled security professionals continues to rise. ...

front-page port 80-shoopyu Lab setup for Malware Analysis πŸͺ²πŸ”¬

Basic Architecture graph TD subgraph VirtualBox subgraph "Windows 7 Machine" subgraph "Flare VM" malware-analysis-tools end end subgraph "Ubuntu 20.04.3 LTS Machine" su...

front-page port 80-shoopyuSuspicious Browser extension analysis πŸ”

1.Which browser supports this extension? With a simple google we can learn that crx files are associated with google chrome’s web browser extensions. ANSWER: Google Chrome 2.What is the ...

front-page port 80-shoopyu Web Login Bypassing Techniques

Greetings, fellow bug bounty hunters! Let’s try to look for oversmarting the web login pages and bypassing tricks Check out this cool chart that breaks down the different ways we can bypass logins:...

front-page port 80-shoopyu Comment system with GISCUS

Adding a Comment System to Your Static Site with Giscus Do you have a static site and want to add a comment system to engage with your readers? Look no further! In this guide, we’ll explore how yo...

front-page port 80-shoopyuUnleashing Azure Sentinel A thrilling lab AdventureπŸ›‘οΈ

Hey there, Get ready to embark on an exciting journey with Azure Sentinel. In this blog, we’ll create a secure log analytics workspace and wreak some controlled chaos with our trusty Azure Senti...

front-page port 80-shoopyu Reverse engineering and Static analysis for Mobile Pentesting

Reverse Engineering and Static Analysis After conducting extensive research on Android penetration testing, reverse engineering, and static analysis, I came across that there are numerous powerf...

front-page port 80-shoopyu Github Dork for finding Sensitive Information

Β  Β  πŸ” GitHub Dorks for Finding Sensitive Information GitHub is not just a platform for version control and collaborative software development, but also a goldmine for sensitive information. GitHu...

front-page port 80-shoopyu Hackthebox CyberApoclypse 2023 | The Cursed Mission

Β  CyberApoclypse CTF 2023 Forensic Challenge : Roten Description : The iMoS is responsible for collecting and analyzing targeting data across various galaxies. The data is collected through th...

front-page port 80-shoopyu HTTP Rate Limit Bypass - Bug Bounty Methodology

Bug Bounty Methodology: HTTP Rate Limit Bypass Introduction Hey there, fellow bug bounty hunters! Today, we’re going to explore a fun and sneaky bug bounty methodology that involves bypassing t...