Understanding NPM and Docker: Simplifying JavaScript DevelopmentWhen building applications with JavaScript, especially using Node.js, managing dependencies and ensuring that your app runs smoothly on any…Oct 5Oct 5
Cross-Site Scripting (XSS)This is just a short note of the topic XSS from the book Bug Bounty Bootcamp The Guide to Finding and Reporting Web Vulnerabilities by…Aug 29Aug 29
Phishy: A Phishing Simulation for Social Engineering AwarenessPhishing attacks remain one of the most effective and dangerous social engineering tactics used by cybercriminals. To better understand…Feb 28Feb 28
Mastering Reconnaissance in Bug Bounty: The Art of Finding Hidden VulnerabilitiesBug bounty hunting is like digital treasure hunting. The key to success? Strong reconnaissance. Without a proper recon strategy, you’re…Feb 14Feb 14
Install Tails OS on a USB Flash driveWalkthrough: How to Install Tails OS on a USB PendriveOct 13, 2024Oct 13, 2024
Agent T Tryhackme WalkthroughHello everyone, welcome back to another walkthrough! Today, we’ll be tackling the Agent T challenge from TryHackMe. This is a…Oct 3, 2024Oct 3, 2024