Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence
Data Analytics for Cybersecurity, Part 1: Getting Started with R Programing Language for Cybersecurity Analytics
SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia
Vulnerability Scanning with Nuclei: The High-Speed, Customizable Solution for Advanced Vulnerability Scanning
The SQLite Database: The Ubiquitous Database that Few Understand
Physical Security: Lock Picking Basics for Hackers
Cyber Threat Intelligence (CTI): Finding C2 Servers, Malware and Botnets
Bypassing Next Generation Firewalls with fragtunnel
Ransomware: Build Your Own Ransomware, Part 1
Hacking the Cloud: Privilege Escalation in AWS
Database Hacking: Common SQL Injection Commands
Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Bug Bounty Hunting, Part 2: Stealthy Parameter Detection with ParamSpider
Open Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with Netlas.io
SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems
Crashing (DoS) Russian Servers with the Bluekeep Vulnerability
Getting Started Bug Bounty Hunting, March 15-17
Web App Hacking: Fuzzing Web Apps to Find Bugs with BurpSuite
Network Basics for Hackers: Domain Name Service (DNS) and BIND. How it Works and How it Breaks
OSINT: Google Hacking and Dorks to Find Key Information