🔰What is CTF? 🔰
CTF (Capture The Flag) is a kind of information security competition that challenges contestants to solve a variety of tasks…
Tech Updates
CTF (Capture The Flag) is a kind of information security competition that challenges contestants to solve a variety of tasks…
Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to…
Android Security (https://github.com/ashishb/android-security-awesome)Collection of Android security related resources AppSec (https://github.com/paragonie/awesome-appsec)Resources for learning about application security Asset Discovery (https://github.com/redhuntlabs/Awesome-Asset-Discovery)List of resources…
What you learn today: What is a Google Dork?How to find keywordsHow to write Google Dorks What is a Google…
Password salting is a technique to protect passwords stored in databases by adding a string of 32 or more characters…
A one-time password token (OTP token) is a security hardware device or software program that is capable of producing a…
An image replay attack is the use of a picture to fool an authentication method. Image replay attacks are most…
The darkweb is part of the internet that isn’t visible to search engines and requires the use of an anonymizing…
A backdoor is a malware type that negates normal authentication procedures to access a system. As a result, remote access…
PDF exploiting is one of the exclusive topics when working in client-side exploitation. This is about creating malicious PDF documents…