aisha javedcyberurdu.hashnode.dev·Jun 25, 2024Kali Linux For BeginnerWhy do ethical hackers use Kali Linux? Is Kali Linux legal in Pakistan? If you want to know more about Kali Linux. This article is useful for you. اخلاقی ہیکرز کالی لینکس کیوں استعمال کرتے ہیں؟ کیا کالی لینکس پاکستان میں قانونی ہے؟ اگر آپ کالی لینکس ...Kali Linux
Krunchkrunch.hashnode.dev·Nov 29, 2023A Guide To Launch Your Dev Tool on Hacker News — Track Where Your Conversions Came FromHacker News (HN) is a popular news website for developers, techies, and startups. It has become a go-to resource for those looking for the latest news and updates in the tech industry. HN is similar to Product Hunt in that it works based on upvotes —...hackernews
ConradWilliamforOpen Source Community Kampalablog.oscakampala.org·Aug 7, 2023Unveiling Kenya's Cyber Siege: Anonymous Sudan's Blitzkrieg on Kenya's Digital FrontiersIntroduction: The recent infrastructural attack on Kenya orchestrated by the hacker group Anonymous Sudan has raised significant concerns about the vulnerability of critical systems in the digital age. In this comprehensive blog, we explore the motiv...3 likes·83 reads#cybersecurity
Japz Divinoh4nt3rx.hashnode.dev·Aug 7, 2023HackerOne redacted usernames disclosure in "Export as .pdf" featureSeverity: Low (3.4)Weakness: Sensitive Information DisclosureBounty: $500 Hello hunters! I just want to share these new findings on the HackerOne bug bounty platform. First, I just wanna let you know that I disagree with the rated severity being Low...425 readsbugbounty
Rameshsil3ntkill3r.hashnode.dev·Jun 28, 2023Sensitive Data Exposure Through Password Reset Functionality - Bug BountyHi there 👋, Hope you're doing well. Today, I'm excited to share one of my interesting discoveries in bug hunting. WHO AM I ?🎭 My self Ramesh. I am a security researcher, moreover certified ethical hacker(CEH), bug bounty hunter and CTF player. Dedi...5 likes·481 readsbugbounty
Hacktushacktus.tech·Jun 12, 2023Taking Over an Entire Organization - A Journey Through Multiple BugsIntroduction Today, I want to share a thrilling adventure, a tale of how a few seemingly harmless bugs can snowball into a security nightmare. Through collaborative work with my friend DreyAnd back in April 2023, we managed to expose vulnerabilities ...10 likes·1.8K readspenetration testing
tercmdwww.tercmd.com·May 25, 2023Monitoring a Hacker News PostI posted a link to my repo regarding AI context lengths to Hacker News under the Show HN category and wanted to see its position in the listing every now and then. API Fortunately, Hacker News has an API which you can send a request to for it to resp...hackernews
Bolu emmanuelbolexzy.hashnode.dev·May 17, 2023Don’t Be a Victim: Protecting Yourself Against Social EngineeringIn today’s interconnected world, social media has revolutionized the way we communicate and seek assistance. With just a few clicks, we can connect with customer support representatives and find solutions to our problems in an instant. It’s convenien...36 readssocial engineering
MemgraphforMemgraphmemgraph.hashnode.dev·Feb 10, 2023How I Found The Most Influential Users on Hacker NewsAt the beginning of my internship and before starting this project, I had no idea what Hacker News was. So for people like me, here’s a quick intro - Hacker News is a website that contains content from the tech industry. Users submit stories from dif...35 readsMemgraph
Adrian Marinblog.adrianthedev.com·Jun 24, 2022Front page of Hacker News, 2nd product of the day on Product Hunt and featured in one of the biggest Ruby newslettersArticle originally posted on our blog. We've had a crazy marketing week 🎉 The biggest public launches yet. A week before, I planned a Product Hunt but didn't launch it because… I was lazy. On Tuesday, I finished the work on the Product Hunt ...34 readsproduct hunt