Hunting Subdomains for a Website
Why should you hunt for subdomains for a website as a penetration tester/ bug bounty hunter? To answer the question we need to know what is a subdoma…
Find out what's new in cybersecurity
Why should you hunt for subdomains for a website as a penetration tester/ bug bounty hunter? To answer the question we need to know what is a subdoma…
Introduction to pip Most of the programmers would already know what is pip? Pip is a package manager for Python. It is used to install packages, upda…
What is WEB 3.0? The goal of Web 3.0 is to eliminate reliance on a single server or database. Web 3.0 sites and programmes will function on peer-to…
Antiviruses and security updates do a fantastic job of protecting a computer from malwares, but they can only function when the operating system is r…
Introduction WordPress is the fastest-growing, most popular CMS in the world because of its user-friendly features, but is when it comes to the se…
On June 30th 2022, the Jenkins security team disclosed 34 vulnerabilities affecting about 29 of over 1700 plugins that it supports. Jenkins is a hi…
theHarvester is a Kali Linux command line tool that combines various search engines, websites or public sources to find email accounts, subdomain n…