Ifihan Olusheyeifihan.hashnode.net·Dec 21, 2020Application of PythonIt is well established that Python has become one of the most popular programming languages. Created by Guido Van Rossum in 1989, it is beginner friendly and easy to read. Python is also portable, extensible and embeddable, object-oriented and functi...Animashaun Taofiq T. and 1 other are discussing this2 people are discussing thisDiscuss·105 likes·867 readsPython 3
Jayesh Somalajayeshsomala.hashnode.net·Jan 7, 2022Hacker MethodologyHackers question everything I strongly believe that everyone has a hacker inside them and all they have to do is wake that person up. But waking up your inner hacker is not that easy - it takes a lot of practice, self-reflection and sometimes blatant...Anagh Bhargava and 26 others are discussing this27 people are discussing thisDiscuss·81 likes·78 readshacking
Tiiatiiaaurora.hashnode.net·Jun 7, 2022CHEAP Book Bundles: Cyber Security, Big Data, IoT, STEM!It is book time again! If you are a self learner and you look for affordable book bundles to learn ALL THE THINGS then you should check out these offers since they are available for only a limited time. This time we have 3 bundle that might interest ...Discuss·34 likes·229 readsbig data
Sudip SenguptaforSudip's Blog on Cloud, DevOps, Cybersecurity and ITSMssengupta3.hashnode.net·Apr 21, 2023Reverse Engineering Malware: Techniques And Tools For Analyzing And Dissecting Malicious SoftwareCybercriminals commonly employ malicious programs to obtain unauthorized system access, exfiltrate sensitive information, or disrupt essential services. In order to defend against these threats, cybersecurity professionals use various approaches to a...Discuss·1 likemalware analysis
Srujan LanderiforLanderi Srujansrujanlanderi.hashnode.net·Apr 20, 2023Understanding the Difference: Viruses, Malware, and RansomwareIntroduction I always thought that the terms Virus, Malware, and Ransomware were used interchangeably, until my esteemed mentor inquired about their meaning, prompting me to realize that they are different. It is important to understand their differe...Discuss·10 likescybersecurity
Scofield Idehenforscofield.hashnode.net·Apr 18, 2023Cracking the Code: Digital Signatures and Bitcoin TransactionsIn the modern digital age, security is of the utmost importance. One way to ensure the security of digital documents is through digital signatures. In this article, we will explore what a digital signature is, what cryptographic primitives are, intro...DiscussBlockchain
Joshua CrawfordforJoshua Crawford's Development Blogjoshuacrawford.hashnode.net·Apr 17, 2023My First Cyber Security ConferenceLead-Up I've always loved the idea of Cyber Security since I was young and through my research months ago, I learned one primary thing: immersion was key. A few months ago I decided to get serious about creating and pursuing the career I want. Being ...DiscussCyberSec
Prateek Singhcoderbuddy.hashnode.net·Mar 31, 2023Tips and Tricks for Winning Big Bounties on Website VulnerabilitiesIntroduction In the world of cybersecurity, "big bounties" are a well-known concept. These bounties, which offer significant financial rewards for identifying and reporting security vulnerabilities in software and hardware systems, have become an inc...Discussbugbounty
Kris BogaertsforTech Noteskbo.hashnode.net·Mar 30, 2023Open Source & Collaborative Security with CrowdSec Part 1Intro CrowdSec is an open-source and collaborative IPS (Intrusion Prevention System). It leverages local behavior analysis to create a global IP reputation network. Analyze behaviors, respond to attacks & share signals across the community. With Crow...DiscussOpen Source
Solomon Achugwohsecuredtips.hashnode.net·Mar 18, 2023OWASP Top 10 Security VulnerabilitiesThe Open Web Application Security Project (OWASP) is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. It’s an international security...Discuss·43 readsOWASP TOP 10
HodlToM00NforHodlToM00Nhodltom00n.hashnode.net·Mar 8, 2023Ethernaut: FallbackPrecisely. Solidity allows developers to create fallback functions that are invoked when a contract receives a transaction that is not handled by any existing functions. For instance, let's say Contract A has been deployed with only a payable fallbac...DiscussSolidity
Kevin TauchmanforKevBot's Security Blogkevbotsec.hashnode.net·Mar 7, 2023On MetasploitMetasploit is a popular open-source framework widely used in ethical hacking and penetration testing. It provides a powerful platform for identifying computer system vulnerabilities and testing network security. Metasploit enables ethical hackers to ...Discussmetasploit
Kevin TauchmanforKevBot's Security Blogkevbotsec.hashnode.net·Mar 7, 2023The OSI Model SimplifiedThe OSI model is a conceptual framework that describes the communication process between two devices in a network. The model is divided into seven layers, each responsible for a specific aspect of network communication. Understanding the technologies...Discussmodel-osi