Threat Hunting Methodology

Photo by Tima Miroshnichenko from PexelsWhat is Threat Hunting?Threat Hunting refers to proactively looking for threats in your network. Threat Hunters actively search the network for any indication or sign of a threat or breach, whether known or unk...

Read More
Dec 29, 2022
OAuth and the flaws in its implementation

Photo by freestocks on UnsplashWhat is OAuth?Open Authorization (also known as OAuth) is an open-source framework that allows you to create accounts on websites without having to create a different user account for each website. They rely on authenti...

Read More
Nov 24, 2022
Detecting Log4j & its Remediation

Alex Chumak on UnsplashThis article is dedicated to log4j and how it’s being exploited in the wild by attackers.Log4jApache Log4j, a project of Apache Software Foundation, is a Java-based logging utility. It is written in java and is a package locate...

Read More
Oct 20, 2022
Infosec Encyclopedia

Hello Bug Hunters 👋🏼Happy Friday!Hope you are all doing great.Today we are sharing an ongoing compilation of resources we have found helpful and tools we use. If you’re new to InfoSec and are looking for a concentrated list of resources to get star...

Read More
Sep 29, 2022
Tools for Bug Bounty

Wassup bug hunters! 🚀Hope you are all having an awesome week 🙂Here is our suggestion for a great GitHub repo with lots of tools that you can use for bug bounty 🥷Moreover, it is categorized; as Recon, Exploitation, etc.📝 We recommend adding it to...

Read More
Sep 27, 2022
Common C Vulnerabilities

Photo by Chris Ried on UnsplashIntroductionThe C programming language is well-known for being extremely susceptible in various ways. Even today, when students in undergraduate programs are taught to code, they are first exposed to C or Java programmi...

Read More
Sep 18, 2022
Burp Suite Extensions to help you Pentest

SourceIntroductionWhen performing a web application penetration test, Burp Suite is the first choice of most security professionals. Due to its support for extensions, it is a really powerful tool to make your life a lot easier. In this blog post, we...

Read More
Sep 14, 2022
Bug Bounty for Beginners

In the world of cyber security, there is a constant battle between white hat hackers (security researchers who identify vulnerabilities to improve security) and black hat hackers (hackers with malicious intent). While black hat hackers often find and...

Read More
Sep 05, 2022