CISA give us some guidance to avoid this raising trend: Preparing for Ransomware Maintain offline backups of data, and regularly test backup and…
Ten security recommendations to protect your Kubernetes deployment
Ransomware attacks are raising against ESXi infrastructure
Learn different techniques to create custom wordlists from the content of a website and how to use John the Ripper or Hashcat to crack Windows or Linux…
In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker…
Passive reconnaissance is a critical step for bug bounties or penetration testing engagements, get ready!

January 2023

Understand what are the most common security threats within the Ethereum Smart Contracts
To grab big bounties in Web3 you rather get inside the Matrix =D
After using nmap and unicornscan for a while, RustScan is probably the fastest to scan TCP and UDP ports, learn how to use it
When looking for new vulnerabilities, fuzzing, is a great technique to crash apps with unexpected data, learn how to do it.
Learn several techniques to scan hosts, bypass firewalls and scan the whole IPv4 universe.
Improve your pentesting skills with the following techniques.