Bilal Gajan Waranicecappman.hashnode.dev·4 hours agoCombatting Carding: Strategies and Code for Developers by Waran Gajan BilalIn today's digital landscape, carding—the illicit use of stolen credit card information—remains a significant threat to both individuals and businesses. Combatting this form of fraud requires a multi-faceted approach, including heightened security me...Discusscarding
Bilal Gajan Waranicecappman.hashnode.dev·5 hours agoSafeguarding Your Software: Understanding and Preventing Exploitation TechniquesIn today's interconnected digital landscape, the security of software systems is paramount. As a developer, safeguarding your clients' systems from exploitation is not just a responsibility but a necessity. Understanding common methods used to cheat ...Discusscybersecurity
AfriMonin4fr1m0n1n.hashnode.dev·17 hours agoHow to evade NSA and CIA surveillance? Basic anonymity techniques for Black Hats.CAUTION: The title is solely for grabbing attention. Anonymity is crucial for circumventing authoritarian laws in your country and enhancing cybersecurity and operational security processes. Understanding that anonymity isn't solely for nefarious pur...DiscussIntelligence Agencieshacking
Ferdi birgülferdibirgul.hashnode.dev·19 hours agoRed Team Fundamentals | Tryhackme Writeup/Walkthrough | By Ferdi BirgülLearn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements. Task 1 : Introduction Cybersecurity is a constant race between white hat hackers and black ...Discussredteaming
Zealynx Securityzealynx.hashnode.dev·a day agoPrevent Front-Running on ERC20 Smart ContractsWhat will you find here? This article explores the critical issue of front-running vulnerabilities in ERC20 tokens on the Ethereum blockchain, focusing on how these security gaps can be exploited through the token allowance mechanism. We provide a de...Discuss·39 readsSmart Contracts
Yasin Saffarisymbolexe.xyz·Apr 25, 2024Activate Your Windows 10/11 for FreeRemember ⚠️ : In the releases ( GitHub Page ) section, you can download the execution file of these commands. Make sure to run the file with admin permission. ⚠️ https://GitHub.com/Symbolexe/W11ACP Requirements Be sure to be connected to the Int...Discussactivate windows 10 & 11
Yasin Saffarisymbolexe.xyz·Apr 24, 2024ToolVerse ToolkitToolVerse ToolVerse is a versatile and user-friendly tool designed to simplify the installation process of various cybersecurity and hacking tools on Linux systems, particularly tailored for Kali Linux and similar distributions. https://GitHub.com/Sy...Discuss#cybersecurity
Yasin Saffarisymbolexe.xyz·Apr 24, 2024VulnersX ToolVulnersX VulnersX is a powerful tool for efficiently searching and analyzing software vulnerabilities. It provides comprehensive results with both SQLite database and text file outputs, ensuring flexibility and ease of use for security professionals ...Discuss#cybersecurity
Yasin Saffarisymbolexe.xyz·Apr 24, 2024SHIFU ToolSHIFU is a comprehensive and powerful toolkit designed to streamline the process of finding detailed information about Common Vulnerabilities and Exposures (CVEs). Introduction SHIFU is a comprehensive and powerful toolkit designed to streamline the ...Discuss#cybersecurity
Amdjed Bensalahamdjedbens.hashnode.dev·Apr 24, 2024Differential Privacy - Concepts and definitionsIn this blog post, we’ll get into the world of Differential Privacy, a crucial concept in Privacy Preserving. We’ll break down complex concepts into simple, easy-to-understand language, exploring key concepts such as Local and Global Differential Pri...DiscussMachine Learning