Все публикации

How I Hack or Pentest Mobile Apps [feat @BugBountyReportsExplained]

Burp Suite - Part 8 - Repeater I

Recon in Cybersecurity #14 - Recon is a Door Opener, Not a Goal

Recon in Cybersecurity #13 - A Primer on Reporting - Don't Sabotage Yourself

Recon in Cybersecurity #11 - The Never Ending JS Files

Recon in Cybersecurity #9 - Buckets, Dorks, Github, and Shodan Research

Recon in Cybersecurity #8 - Directory Bruteforcing - Attack from Multiple Fronts

Recon in Cybersecurity #5 - The Importance of Coding in Recon

Google Bard vs. GPT4 - Hands-On First Look [Cybersecurity]

You Can’t Hack Them All - Master of One - From Noob to Clients

Ultimate GraphQL Recon - A Tactical Approach

Paid to Hack - Salaries in Cybersecurity

How to Detect & Bypass Detection of ChatGPT and GPT3 Generated Text

How I Use ChatGPT as a Cybersecurity Professional

From Hacker to Hero - The Exciting World of Cybersecurity Careers

How to Bypass Authentication [Multiple Ways]

How to Get Pentesting and Appsec Clients [Unconventionally]

Practical Web Application Security - Part 28 - Password Mismanagement Attacks [Hacksplaining]

From Practice Labs to Real Targets - [and No Bug Bounties]

Practical Web Application Security - Part 27 - information Leakage Defenses [Hacksplaining]

Practical Web Application Security - Part 26 - information Leakage Attacks [Hacksplaining]

Practical Web Application Security - Part 25 - User Enumeration Defenses [Hacksplaining]

Practical Web Application Security - Part 24 - User Enumeration Attacks [Hacksplaining]

Insights from my 55 Appsec Assessments and Pentests in 2022