This blog is dedicated to penetration testing and offensive security for ethical hackers, security professionals, bug hunters or anyone interested in cybersecurity.
Why subscribe?
It is free and you can receive the updates directly in your inbox.
Disclaimers
The profile picture has a Creative Commons 3.0 license and its creators are: Phantom Open Emoji maintainers and contributors Source: https://es.wikipedia.org/wiki/Archivo:PEO-ninja.svg
Never use the techniques described here against any IP address or software you do not own or if it is not inside the scope of a bug bounty program. Remember that in a penetration testing engagement you must comply the rules of engagement and the hosts that are part of the audit.

Subscribe to Learn Pentesting like a Pro!
People
DH
Stay ahead in the security game.