Cehv12 is a very bad course not alot of companies are looking for ethical hacking its not important anymore
Читать полностью…I am new to bug bounty. What do you advise me to learn without learning programming
Читать полностью…I have a question, I got a subdomain when you give a parameter called runcmd a value like ls it returns a 500 internal server error Read,is there anyway to bypass it
Читать полностью…Нужны заинтересованные люди в команду.
Доход от 900 долларов за неделю,полностью дистанционный формат.
Пишите мне + в личные сообщения.
hello guys, i just registered an aws s3 bucket but i cant find the vuln region hence the takeover is incomplete, what can i do here
Читать полностью…I have one question, i found that one subdomain is using CL.TE header in HTTP1/1 , it is sure that is vurnable to http smuggling?
Читать полностью…Hola, que tanto doxean las empresas de bug bounty sobre los hunters que acceden a sus programas?
Hi, how much do bug bounty companies dox the hunters who access their programs?
Hi everyone
Please is finding an app ID of a website a vulnerability and how can I exploit it for them to believe it's a vulnerability?
Cybersecurity and IT Training Resources Available
If you're looking to build your skills in cybersecurity or IT, I offer a range of recorded training sessions with supporting documents and interview questions, all at an affordable price.
Cybersecurity Domains:
1. SOC Analyst
2. Splunk Administration
3. IBM QRadar Administration
4. Certified Ethical Hacker (CEH)
5. Penetration Testing
Other IT Skills:
Identity and Access Management: CyberArk, SailPoint
Cloud and DevOps: Azure, DevOps
Web Development: ReactJS, HTML, CSS, JavaScript
Database Management: Oracle, ADF, ADB
…and many more!
If you’re interested in any of these skills or looking for resources on a topic not listed here, feel free to reach out.
Hy guys , i found unregistered npm package , should i report directly to program or i should wait for dns pingback as a proof of concept ?
Читать полностью…