π Top OSCP Resources: Links to Help You Prepare for Your Penetration Testing Journey
π https://hacklido.com/blog/331-top-oscp-resources-links-to-help-you-prepare-for-your-penetration-testing-journey
π https://hacklido.com/blog/331-top-oscp-resources-links-to-help-you-prepare-for-your-penetration-testing-journey
HACKLIDO
Top OSCP Resources: Links to Help You Prepare for Your Penetration Testing Journey
OSCP Syllabus: https://www.offensive-security.com/information-security-training/penetration-testing-training-kali-linux/ Windows Privilege Escalation:...
π2
π Linux Unleashed: A World of Control, For Those Seeking a Secure Console
π https://hacklido.com/blog/334-linux-unleashed-a-world-of-control-for-those-seeking-a-secure-console
π https://hacklido.com/blog/334-linux-unleashed-a-world-of-control-for-those-seeking-a-secure-console
HACKLIDO
Linux Unleashed: A World of Control, For Those Seeking a Secure Console
Are you tired of the limitations of traditional operating systems? Are you ready to discover a whole new world of computing? Introduction Suppose youβve ev...
Dear Attendees,
We would like to express our sincere gratitude for attending the Hacklido's webinar on the topic of recon for bug bounties. It was a pleasure to have you all join us for this insightful session.
Your presence at the webinar is a testament to your dedication and passion for learning about the latest trends and practices in the field of bug bounty hunting. We hope that you found the information shared in the webinar to be useful and valuable.
Team Hacklido is committed to providing high-quality educational resources and events to our community, and your participation in this webinar helps us to achieve this goal. We appreciate your support and look forward to seeing you at our future events.
Thank you once again for your time and participation.
Best regards,
Team Hacklido
We would like to express our sincere gratitude for attending the Hacklido's webinar on the topic of recon for bug bounties. It was a pleasure to have you all join us for this insightful session.
Your presence at the webinar is a testament to your dedication and passion for learning about the latest trends and practices in the field of bug bounty hunting. We hope that you found the information shared in the webinar to be useful and valuable.
Team Hacklido is committed to providing high-quality educational resources and events to our community, and your participation in this webinar helps us to achieve this goal. We appreciate your support and look forward to seeing you at our future events.
Thank you once again for your time and participation.
Best regards,
Team Hacklido
β€7π2π2
π Getting Started with Frida: Setting up on an Emulator
π https://hacklido.com/blog/338-getting-started-with-frida-setting-up-on-an-emulator
π https://hacklido.com/blog/338-getting-started-with-frida-setting-up-on-an-emulator
HACKLIDO
Getting Started with Frida: Setting up on an Emulator
A well-liked dynamic instrumentation tool called Frida can be used to carry out a variety of security testing tasks. It enables programmers and security e...
π Understanding Buffer Overflow Vulnerabilities [Part 2] - Stack Overflow in a simple C program
π https://hacklido.com/blog/339-understanding-buffer-overflow-vulnerabilities-part-2-stack-overflow-in-a-simple-c-program
π https://hacklido.com/blog/339-understanding-buffer-overflow-vulnerabilities-part-2-stack-overflow-in-a-simple-c-program
HACKLIDO
Understanding Buffer Overflow Vulnerabilities [Part 2] - Stack Overflow in a simple C program
Introduction Greetings amazing readers, welcome to the second part of our Buffer Overflow Boot Camp. We started with understanding the memory layout and t...
π₯3
π Privileges Escalation Techniques (Basic to Advanced) for Windows - (Part 1)
π https://hacklido.com/blog/340-privileges-escalation-techniques-basic-to-advanced-for-windows-part-1
π https://hacklido.com/blog/340-privileges-escalation-techniques-basic-to-advanced-for-windows-part-1
HACKLIDO
Privileges Escalation Techniques (Basic to Advanced) for Windows - (Part 1)
Introduction: From a hackerβs perspective, Privilege Escalation is the art of increasing privileges from initial access, typically that of a standard user or...
π Holehe: The Email Investigation Tool You Need for OSINT
π https://hacklido.com/blog/341-holehe-the-email-investigation-tool-you-need-for-osint
π https://hacklido.com/blog/341-holehe-the-email-investigation-tool-you-need-for-osint
HACKLIDO
Holehe: The Email Investigation Tool You Need for OSINT
Hey guyβs this is me, @dheerajydv19 , and in todayβs blog, we will be learning about an awesome tool for email osint. Letβs first learn the basic info abo...
π Linux Flavors Galore: A Tour You'll Adore!
π https://hacklido.com/blog/344-linux-flavors-galore-a-tour-youll-adore
π https://hacklido.com/blog/344-linux-flavors-galore-a-tour-youll-adore
HACKLIDO
Linux Flavors Galore: A Tour You'll Adore!
Are you ready to dive into the exciting world of Linux and discover your perfect flavor? If the answer is yes, then youβve come to the right place! Welcome t...
π1
π Introduction to M4lw@r3 Analysis β What should you know ?
π https://hacklido.com/blog/347-introduction-to-m4lw-at-r3-analysis-what-should-you-know
π https://hacklido.com/blog/347-introduction-to-m4lw-at-r3-analysis-what-should-you-know
HACKLIDO
Introduction to M4lw@r3 Analysis β What should you know ?
Itis been a while, I havenβt posted anything on medium. But today I am here with another amazing blog post on Malware Analysis. In this blog, we will see wha...
π1
π 30-Minute Heist: How I Bagged a $1500 Bounty in Just few Minutes!
π https://hacklido.com/blog/350-30-minute-heist-how-i-bagged-a-1500-bounty-in-just-few-minutes
π https://hacklido.com/blog/350-30-minute-heist-how-i-bagged-a-1500-bounty-in-just-few-minutes
HACKLIDO
30-Minute Heist: How I Bagged a $1500 Bounty in Just few Minutes!
Hey fam, Itβs me, Charlie, the hacker, but my real name is Rajiv. After taking a break from my stock trading career, I decided to resume hunting for vu...
How would it be if there is a platform that is specially created for infosec and which
- Enables anyone of you to create your own sub community inside it
- Have posts in it, moderate it, get subscribers subscribe to it, even monetize in your own way.
- Let you share, discuss and exchange ideas related to cybersec.
π« Like reddit but for cybersecurity
Tell us in the comment π
- Enables anyone of you to create your own sub community inside it
- Have posts in it, moderate it, get subscribers subscribe to it, even monetize in your own way.
- Let you share, discuss and exchange ideas related to cybersec.
π« Like reddit but for cybersecurity
Tell us in the comment π
π6β€1
π Cyber Security Round Up #6 - Mar 16th, 23
π© API Security | Akto, Hacking CI/CD pipeline, BufferOverflow Series, JWT, XSS, Email OSINT, FRIDA, Malware Analysis, Nuclei, & moreβ¦
π https://hacklido.com/blog/352-cyber-security-round-up-6-mar-16th-23
π© API Security | Akto, Hacking CI/CD pipeline, BufferOverflow Series, JWT, XSS, Email OSINT, FRIDA, Malware Analysis, Nuclei, & moreβ¦
π https://hacklido.com/blog/352-cyber-security-round-up-6-mar-16th-23
HACKLIDO
Cyber Security Round Up #6 - Mar 16th, 23
March 16th, 2023 π API Security | Akto, Hacking CI/CD pipeline, BufferOverflow Series, JWT, XSS, Email OSINT, FRIDA, Malware Analysis, Nuclei, & more...
β€3
π Understanding Buffer Overflow Vulnerabilities [Part 3] - Understanding CPU registers ~ by @WatashiwaSid
π https://hacklido.com/blog/353-understanding-buffer-overflow-vulnerabilities-part-3-understanding-cpu-registers
π https://hacklido.com/blog/353-understanding-buffer-overflow-vulnerabilities-part-3-understanding-cpu-registers
HACKLIDO
Understanding Buffer Overflow Vulnerabilities [Part 3] - Understanding CPU Registers
Introduction Greetings to amazing readers! The engagement in my previous articles has made me continue my boot camp on Buffer Overflow vulnerabilities and...
β€2