This article provides a list of the top five Python books. I've read each book on this list, so I can guarantee for their excellence and level of knowledge.
This article provides a list of the top five Linux books. I've read each book on this list, so I can vouch for their excellence and level of knowledge.
The Security Misconfiguration vulnerability from Owasp Top 10 is explained in the article along with a Tryhackme demonstration.
With examples from Tryhackme and Owaspba labs, the article describes broken authentication, one of the most critical Owasp Top 10 vulnerabilities.
This article explains the sensitive data exposure vulnerability along with an exercise from the Tryhackme platform.
Introduction to brute force attacks using Burp Suite and Hydra following some practice problems of OWASPBWA Lab.
An in-depth guide on Command Injection web security vulnerability along with TryHackMe and OWASPBWA challenges for practice.
The blog talks about the most easy-to-learn web security vulnerability HTML Injection.
Learn about the first step of finding any vulnerability in a web application using google dorks and Linux commands like ping, host, and nslookup.
This is part 2 of the Website Enumeration & Information Gathering article which talks about the first step of finding any vulnerability in a web application using Linux commands whatweb, nmap, and nikto.
An introduction to the Burp Suite program and three of its primary features (Intercept, Repeater & Intruder).
This article provides you with the information you will need to complete the TryHackMe and OWASPBWA practice labs for Broken access control vulnerability.
These 30+ top Linux commands are selected to take you from a beginner to an advance/power user of Linux.