Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
Forem
Close
#
pentest
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Git Tales: Part 2 - Demons in the Cloud
Peter Davis
Peter Davis
Peter Davis
Follow
May 9
Git Tales: Part 2 - Demons in the Cloud
#
bugbounty
#
infosec
#
cloudsecurity
#
pentest
1
reaction
Comments
Add Comment
5 min read
Understanding a Netcat-Based Reverse Shell Using FIFO
Ilia Tayefi
Ilia Tayefi
Ilia Tayefi
Follow
May 3
Understanding a Netcat-Based Reverse Shell Using FIFO
#
linux
#
bash
#
pentest
Comments
Add Comment
3 min read
[REPOST] Installing Genymotion for Android App Pentesting: The Definitive Guide
Blue Byte
Blue Byte
Blue Byte
Follow
May 2
[REPOST] Installing Genymotion for Android App Pentesting: The Definitive Guide
#
genymotion
#
android
#
pentest
#
mobile
Comments
Add Comment
3 min read
Git Tales: Secrets in the Shadows
Peter Davis
Peter Davis
Peter Davis
Follow
Apr 29
Git Tales: Secrets in the Shadows
#
bugbounty
#
infosec
#
pentest
#
sourcecodereview
2
reactions
Comments
Add Comment
3 min read
Criando um Port Scan com Python3
MathzRocha (S1cK_)
MathzRocha (S1cK_)
MathzRocha (S1cK_)
Follow
Apr 29
Criando um Port Scan com Python3
#
pentest
#
cybersecurity
#
programming
#
python
1
reaction
Comments
Add Comment
3 min read
How i Became a Pentester | Como me Tornei um Pentester
Gustavo-Hetrich
Gustavo-Hetrich
Gustavo-Hetrich
Follow
Apr 29
How i Became a Pentester | Como me Tornei um Pentester
#
cybersecurity
#
python
#
beginners
#
pentest
1
reaction
Comments
Add Comment
5 min read
Web Cache Deception Attacks
Blue Byte
Blue Byte
Blue Byte
Follow
May 9
Web Cache Deception Attacks
#
hacking
#
pentest
#
bugbounty
#
cybersecurity
Comments
Add Comment
2 min read
Mastering Cybersecurity: A Guide to Pentest+, CySA+, and SecurityX Certifications
SkillBoostTrainer
SkillBoostTrainer
SkillBoostTrainer
Follow
Mar 27
Mastering Cybersecurity: A Guide to Pentest+, CySA+, and SecurityX Certifications
#
pentest
#
cysa
#
security
#
cybersecurity
Comments
Add Comment
2 min read
Next.js Middleware Broken Access Controls
Blue Byte
Blue Byte
Blue Byte
Follow
Mar 27
Next.js Middleware Broken Access Controls
#
nextjs
#
bugbounty
#
pentest
#
hacking
Comments
Add Comment
1 min read
Basics of Pentest on AWS Environment
Muhammad Q Shahzad
Muhammad Q Shahzad
Muhammad Q Shahzad
Follow
Mar 24
Basics of Pentest on AWS Environment
#
aws
#
pentest
#
webdev
#
programming
Comments
Add Comment
2 min read
🔐 Top 8 API Pentesting Tools Every Developer & Security Pro Should Know
Sam Bishop
Sam Bishop
Sam Bishop
Follow
Apr 10
🔐 Top 8 API Pentesting Tools Every Developer & Security Pro Should Know
#
api
#
security
#
pentest
#
tools
Comments
Add Comment
4 min read
Attacking WebDAV Protocol
Blue Byte
Blue Byte
Blue Byte
Follow
Mar 9
Attacking WebDAV Protocol
#
pentest
#
webdav
#
network
#
hacking
Comments
Add Comment
1 min read
2FA Bypass via Response Manipulation
Blue Byte
Blue Byte
Blue Byte
Follow
Feb 24
2FA Bypass via Response Manipulation
#
bugbounty
#
pentest
#
2fa
#
mfa
Comments
Add Comment
1 min read
Why “Think Like an Attacker” is harmful FT: Threat Modeling?
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
Follow
Feb 13
Why “Think Like an Attacker” is harmful FT: Threat Modeling?
#
security
#
threatmodeling
#
cybersecurity
#
pentest
Comments
Add Comment
2 min read
How To Find Zombie Hosts With Nmap?
Ali
Ali
Ali
Follow
Oct 29 '24
How To Find Zombie Hosts With Nmap?
#
nmap
#
pentest
#
security
#
network
Comments
Add Comment
2 min read
You do not know, what you do not know.
RobertB
RobertB
RobertB
Follow
Sep 10 '24
You do not know, what you do not know.
#
security
#
pentest
#
cybersecurity
Comments
Add Comment
2 min read
What is a polyglot in Hacking
Mrhili Mohamed Amine
Mrhili Mohamed Amine
Mrhili Mohamed Amine
Follow
Sep 13 '24
What is a polyglot in Hacking
#
security
#
xss
#
pentest
#
hacking
Comments
Add Comment
2 min read
Explorando o Metasploit Framework: A Ferramenta Essencial para Testes de Penetração e Segurança
Felipe Silva Rosa
Felipe Silva Rosa
Felipe Silva Rosa
Follow
Jul 25 '24
Explorando o Metasploit Framework: A Ferramenta Essencial para Testes de Penetração e Segurança
#
security
#
pentest
#
metasploit
#
webdev
Comments
Add Comment
3 min read
Setting Up Your Flipper Zero: A Step-by-Step Guide for Beginners
Bellamer
Bellamer
Bellamer
Follow
Aug 19 '24
Setting Up Your Flipper Zero: A Step-by-Step Guide for Beginners
#
pentest
#
cybersecurity
#
development
#
beginners
8
reactions
Comments
Add Comment
4 min read
10 Livros para Aprendizado Avançado de Pentest e Segurança (Hackers)
Marcos Oliveira
Marcos Oliveira
Marcos Oliveira
Follow
Aug 8 '24
10 Livros para Aprendizado Avançado de Pentest e Segurança (Hackers)
#
hacker
#
pentest
#
livro
2
reactions
Comments
Add Comment
12 min read
How I transformed my career from software engineer to a penetration tester?
pwn.guide
pwn.guide
pwn.guide
Follow
Apr 21 '24
How I transformed my career from software engineer to a penetration tester?
#
cybersecurity
#
hacking
#
pentest
#
learning
2
reactions
Comments
Add Comment
2 min read
Otimizando Wordlists para Pentests
Ronaldo Modesto
Ronaldo Modesto
Ronaldo Modesto
Follow
Mar 2 '24
Otimizando Wordlists para Pentests
#
security
#
pentest
#
hacking
#
go
10
reactions
Comments
Add Comment
7 min read
O que vem depois do Pentesting?
Gabriel Galdino
Gabriel Galdino
Gabriel Galdino
Follow
Jan 31 '24
O que vem depois do Pentesting?
#
braziliandevs
#
pentest
#
security
#
appsec
14
reactions
Comments
Add Comment
13 min read
Cloud Pentest 101
Juliana Gaioso
Juliana Gaioso
Juliana Gaioso
Follow
for
AWS Community Builders
Dec 3 '23
Cloud Pentest 101
#
cloud
#
security
#
pentest
#
cloudnative
35
reactions
Comments
Add Comment
2 min read
Information Gathering
Fawazkh80
Fawazkh80
Fawazkh80
Follow
Jul 1 '23
Information Gathering
#
web
#
security
#
pentest
#
cybersecurity
6
reactions
Comments
Add Comment
2 min read
loading...
We're a blogging-forward open source social network where we learn from one another
Log in
Create account