Browsing Tag
cybersecurity
117 posts
How to Install 377 Ethical Hacking Tools in Termux with Tool-X
Termux is a popular app for Android that lets you use a Linux system on your phone. Many…
Pickle Rick | TryHackMe
Luego de conectarse a la máquina y ver que efectivamente tenemos conexión con aquello, hacemos un escaneo con…
Prevent CSRF Vulnerabilities in Symfony Easily
Cross-Site Request Forgery (CSRF) is one of the most common web application vulnerabilities, and yes — even popular…
Your First Ethical Hack: Learn Network Scanning with Nmap
One of the best places to begin with cybersecurity is with Nmap — a beginner-friendly tool used by…
The Digital Dilemma: Balancing Visibility with Privacy
Imagine this: waking up to your personal information plastered on the web—all because you were too open on…
RunAs-Stealer
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging Github Link
Open Redirect Vulnerability: Exploitation, Prevention & Real-World Examples – @verylazytech
Full Article link Basic info — Open Redirect Open Redirect (also known as Unvalidated Redirects and Forwards) occurs…
Fix OAuth Misconfigurations in Laravel: Best Practices
Introduction to OAuth Misconfigurations in Laravel OAuth is a popular authorization framework used by many web applications, including…
Guardius and OWASP ZAP: Boosting Web Application Security with Comprehensive Scanning
In an age where cyber threats are escalating daily, the need for robust web application security tools has…
SSH LLM Honeypot caught a real threat actor
Introduction In this article, I’ll show you how an LLM honeypot can trick a threat actor. The threat…