This blog is dedicated to penetration testing and offensive security for ethical hackers, security professionals, bug hunters or anyone interested in cybersecurity.

Why subscribe?

It is free and you can receive the updates directly in your inbox.

Disclaimers

  • The profile picture has a Creative Commons 3.0 license and its creators are: Phantom Open Emoji maintainers and contributors Source: https://es.wikipedia.org/wiki/Archivo:PEO-ninja.svg

  • Never use the techniques described here against any IP address or software you do not own or if it is not inside the scope of a bug bounty program. Remember that in a penetration testing engagement you must comply the rules of engagement and the hosts that are part of the audit.

Subscribe to Learn Pentesting like a Pro!

Stay updated on the latest cybersecurity insights from Cloud and Mobile to Blockchain. (HUNDREDS OF SUBSCRIBERS)

People

Stay ahead in the security game.