2 minDatabase Hacking: Common SQL Injection CommandsWelcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially...
2 minWhat is a CyberWarrior? The Hackers-Arise Cyberwarrior PhilosophyIf you are reading this, you are very likely interested in the field of cybersecurity. You may also be considering studying...
3 minSoftware Defined Radio (SDR) for Hackers: Choosing the Best Hardware for SDRWelcome back, my aspiring RF hackers! Before embarking upon the study of SDR for Hackers it is good idea to take a close look at the...
3 minOSINT: Finding Email Passwords in Dumps with h8mailWelcome back, my aspiring OSINT Investigators! Often as OSINT investigators, pentesters and hackers, we need to determine if a email...