vulnerabilities

  1. R

    Best Website Hacking/Penetration Testing Course

    What you’ll learn 100+ Videos (10+ hours) to teach you website hacking from scratch. 50+ hands-on real-life website hacking examples - from simple to advanced. Discover, exploit and mitigate a number of dangerous web vulnerabilities. Hack cloud servers using these vulnerabilities. No prior...
  2. R

    Black Hat Hardware Hacking

    For the love of Money - Finding and Exploiting Vulnerabilities in Mobile point of sales systems God Mode Unlocked- Hardware Backdoor I for One Welcome Our New Power Analysis Overloads Last Call for Satcom Security Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers...
  3. R

    Ethical Hacking: Vulnerability Research

    What you’ll learn Learn how to find vulnerabilities Learn how to run Exploits Learn about scanning targets Learn basic hacking Requirements No prior requirements Kali Linux installed or Live USB Description You may have heard about vulnerabilities and exploits? Many computers get...
  4. R

    Bug Bounty - An Advanced Guide to Finding Good Bugs

    Bug bounties are evolving year after year and thousands of infosec enthuasiasts are looking to join the boat. Having a great place on that boat requires dedication and investing a great amount of time of work. In fact, there are multiple types of vulnerabilities and mastering the most important...
  5. charlie

    ⚔️ Website Hacking Penetration Testing & Bug Bounty Hunting ⚔️ // 👺🤯 posted by charlie :) 👺🤯

    ⚔️Website Hacking Penetration Testing & Bug Bounty Hunting 👺👺 📋Content: 1️⃣ Chapter 1 2️⃣ Preparation - Creating a Penetration Testing Lab 3️⃣ Preparation - Linux Basics 4️⃣ Website Basics 5️⃣ Information Gathering 6️⃣ File Upload Vulnerabilities 7️⃣ Code Execution Vulnerabilities 8️⃣ Local...
  6. R

    Penetration Testing Using SQL Injection to Recognize the Vulnerable Point on Web Pages

    Web pages vulnerabilities have been exploited since early `90s against user oriented applications such as email, online shopping, and Web banking [1]. Penetration testing is a technique for finding vulnerability or loop holes that exist in web pages which can help for ruling out illegal access...
Top