Ifihan Olusheyeifihan.hashnode.netΒ·Dec 21, 2020Application of PythonIt is well established that Python has become one of the most popular programming languages. Created by Guido Van Rossum in 1989, it is beginner friendly and easy to read. Python is also portable, extensible and embeddable, object-oriented and functi...105 likesΒ·867 readsPython 3
Jayesh Somalajayeshsomala.hashnode.netΒ·Jan 7, 2022Hacker MethodologyHackers question everything I strongly believe that everyone has a hacker inside them and all they have to do is wake that person up. But waking up your inner hacker is not that easy - it takes a lot of practice, self-reflection and sometimes blatant...81 likesΒ·78 readshacking
Tiiatiiaaurora.hashnode.netΒ·Jun 7, 2022CHEAP Book Bundles: Cyber Security, Big Data, IoT, STEM!It is book time again! If you are a self learner and you look for affordable book bundles to learn ALL THE THINGS then you should check out these offers since they are available for only a limited time. This time we have 3 bundle that might interest ...34 likesΒ·229 readsbig data
Sudip Senguptassengupta3.hashnode.netΒ·Apr 21, 2023Reverse Engineering Malware: Techniques And Tools For Analyzing And Dissecting Malicious SoftwareCybercriminals commonly employ malicious programs to obtain unauthorized system access, exfiltrate sensitive information, or disrupt essential services. In order to defend against these threats, cybersecurity professionals use various approaches to a...1 likemalware analysis
Srujan Landerisrujanlanderi.hashnode.netΒ·Apr 20, 2023Understanding the Difference: Viruses, Malware, and RansomwareIntroduction I always thought that the terms Virus, Malware, and Ransomware were used interchangeably, until my esteemed mentor inquired about their meaning, prompting me to realize that they are different. It is important to understand their differe...10 likescybersecurity
Scofield Idehenscofield.hashnode.netΒ·Apr 18, 2023Cracking the Code: Digital Signatures and Bitcoin TransactionsIn the modern digital age, security is of the utmost importance. One way to ensure the security of digital documents is through digital signatures. In this article, we will explore what a digital signature is, what cryptographic primitives are, intro...Blockchain
Joshua Crawfordjoshuacrawford.hashnode.netΒ·Apr 17, 2023My First Cyber Security ConferenceLead-Up I've always loved the idea of Cyber Security since I was young and through my research months ago, I learned one primary thing: immersion was key. A few months ago I decided to get serious about creating and pursuing the career I want. Being ...CyberSec
Prateek Singhcoderbuddy.hashnode.netΒ·Mar 31, 2023Tips and Tricks for Winning Big Bounties on Website VulnerabilitiesIntroduction In the world of cybersecurity, "big bounties" are a well-known concept. These bounties, which offer significant financial rewards for identifying and reporting security vulnerabilities in software and hardware systems, have become an inc...bugbounty
Kris Bogaertskbo.hashnode.netΒ·Mar 30, 2023Open Source & Collaborative Security with CrowdSec Part 1Intro CrowdSec is an open-source and collaborative IPS (Intrusion Prevention System). It leverages local behavior analysis to create a global IP reputation network. Analyze behaviors, respond to attacks & share signals across the community. With Crow...Open Source
Solomon Achugwohsecuredtips.hashnode.netΒ·Mar 18, 2023OWASP Top 10 Security VulnerabilitiesThe Open Web Application Security Project (OWASP) is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. Itβs an international security...43 readsOWASP TOP 10
HodlToM00Nhodltom00n.hashnode.netΒ·Mar 8, 2023Ethernaut: FallbackPrecisely. Solidity allows developers to create fallback functions that are invoked when a contract receives a transaction that is not handled by any existing functions. For instance, let's say Contract A has been deployed with only a payable fallbac...Solidity
Kevin Tauchmankevbotsec.hashnode.netΒ·Mar 7, 2023On MetasploitMetasploit is a popular open-source framework widely used in ethical hacking and penetration testing. It provides a powerful platform for identifying computer system vulnerabilities and testing network security. Metasploit enables ethical hackers to ...metasploit
Kevin Tauchmankevbotsec.hashnode.netΒ·Mar 7, 2023The OSI Model SimplifiedThe OSI model is a conceptual framework that describes the communication process between two devices in a network. The model is divided into seven layers, each responsible for a specific aspect of network communication. Understanding the technologies...model-osi