Hello, fellow Bug Hunters! It’s me again Jefferson Gonzales, and in this article, I’ll tell you about how I got my…
Python is one of the most popular programming languages in the world, used for a wide range of applications, from…
Smart cities are the future of urbanization, where technology is used to improve the quality of life for citizens, enhance…
Car racing games have always been popular among gamers. The thrill of racing against other players or the computer, the…
ChatGPT can’t replace skilled threat actors — at least not yet — but security researchers say there is evidence that…
As a web developer(front end) and ethical hacker, I had always been interested in learning more about cybersecurity (not me…
If you’re a Windows user, you might have come across the IPConfig command while troubleshooting network issues. IPConfig is a…
Managing Microsoft 365, automating routine operations, or obtaining data from systems? PowerShell scripts really streamline your day-to-day tasks. PowerShell is…
Committing routine and even rarely required tasks to scripts is almost always a big win because you don’t have to…
What is a SSH protocol ? The SSH protocol (also known as Secure Shell) is a network protocol for secure…
The SSH private key code should not be just a decoration. Unfortunately, some people think they will never lose their…
Today we’ll look at one of the external penetration tests that I carried out earlier this year. Due to the…
How many of you often see messages and alerts saying “Your credentials are compromised and found on darkweb”. In this…
We often confront with software applications that are either password protected or require certain conditions to proceed. One way to…