zer0dforInfos3c Blogsinfos3c.hashnode.net·Dec 7, 2022The Story Of How I Bypass SSO LoginHello everyone, I decided to tell you my stories about offensive security. This is the first story I share on my blog. Hope it will be a good start. In these stories, of course, I can not give the company names but I will tell you how it happened and...Discuss·8 likes·92 readspentesting
M S SripatiforRisky Contextsripati.hashnode.net·Jan 2, 2020External Network VAPT: tools, information sourcesPhoto by Sean Musil on Unsplash This is a live post; it will undergo changes, which are captured in change log, provided at the end of this post. Being part of many external VAPT engagements, one thing was clear from outset — methodology is the key, ...Discusstech
mauvehedformauveRANTmauvehed.hashnode.net·Feb 17, 2023How I hacked a building with a can of cokeThe introductionThe following story is intended to outline a few different elements I've discovered in myself since receiving an ADHD diagnosis in late 2020, and reflecting on my life and childhood. I've long struggled to understand why I made some o...Discuss·6.7K readsSecurityhacking
Abdul HakimforNubesec's Communitynubesec.hashnode.net·Feb 25, 2023PenTest IntroductionWhat is PenTest? PenTest is the acronym for "Penetration Testing" or a kind of activity that conducts to identify any security weakness and vulnerabilities that may exist in our network or system. There are many ways to perform Penetration Testing in...Discuss·27 readsPentest
mauvehedformauveRANTmauvehed.hashnode.net·Feb 17, 2023How I hacked a building with a can of cokeThe introductionThe following story is intended to outline a few different elements I've discovered in myself since receiving an ADHD diagnosis in late 2020, and reflecting on my life and childhood. I've long struggled to understand why I made some o...Discuss·6.7K readsSecurityhacking
zer0dforInfos3c Blogsinfos3c.hashnode.net·Dec 7, 2022The Story Of How I Bypass SSO LoginHello everyone, I decided to tell you my stories about offensive security. This is the first story I share on my blog. Hope it will be a good start. In these stories, of course, I can not give the company names but I will tell you how it happened and...Discuss·8 likes·92 readspentesting
M S SripatiforRisky Contextsripati.hashnode.net·Jan 12, 2020Do not kill your pentester for little or no value-addDisclaimer: This would be a long post (culmination of many old posts) with lot of different opinions, thoughts. If weaving is not right, please provide feedback on how it could be corrected. I had the good fortune of reading couple of threads by gent...DiscussSecurity
M S SripatiforRisky Contextsripati.hashnode.net·Jan 2, 2020External Network VAPT: tools, information sourcesPhoto by Sean Musil on Unsplash This is a live post; it will undergo changes, which are captured in change log, provided at the end of this post. Being part of many external VAPT engagements, one thing was clear from outset — methodology is the key, ...Discusstech