Author: Cybernoz
What makes Mastodon different from Twitter Source link
I opened on a malicious email attachment.. and this is what happened! Source link
One common perception is that it is easier to write rules for Semgrep than CodeQL. Having worked extensively with both…
According to reports, Amazon has stopped selling Flipper Zero, one of the most widely used pentesting tools. Amazon tagged the…
Every pentester knows that amazing feeling when they catch a reverse shell with netcat and see that oh-so-satisfying verbose netcat…
On Apr 5, I had a look on Flickr login flow with Yahoo. Not after long I ran into a Flickr…
You’re sitting with your iPhone in hand, gazing at the screen with annoyance, fury, and helplessness. You need to send…
No BS Guide – Supercharge your Scripts with Xargs Source link
Applying root cause analysis to decision making Do you ever find your brain “connecting the dots” between multiple ideas or…
Hacking 1Password | Episode 2 – Decrypting the Protocol Source link
The malicious use of Telegram is not surprising as the platform has been referred to as the “New Dark Web”…
Broken Access Control – Lab #11 Insecure direct object references | Short Version Source link