Skip to content

Latest articles

How I passed CEHv10 Post Exam Write-up

In this post I’d like to share my exam experience and to point out some of the best resources to help you prepare for and pass the Certified Ethical Hacker certification offered by EC-Council.

Fuzz Parameters, Directories & More with Ffuf

The art of fuzzing is a vital skill for any penetration tester or hacker to possess. The faster you fuzz, and the more efficiently you are at doing it, the closer you are to achieving

Use Surge.sh: Free hosting for XSS payloads

Surge.sh flies under the radar of many, but it’s pretty common among static-site developers. I find it to be the best place for hosting my XSS payloads. It’s free, easy, they provide SSL, and you

Top 5 Most Common Mobile App Security Flaws

Whether you’re a pentester looking to gain some experience in mobile hacking or a developer aiming to build secure apps, familiarizing yourself with some of the common security mistakes developers make will serve you well.

Set Up Pi-Hole®: Block ads for devices inside your network

If you are looking for a little toy project to pass some time during these days then this project may be for you. In this tutorial, we will install Pi-hole on a Raspberry Pi to

Protect MacOS Against Keyloggers & Ransomware

While MacOS computers have been spared from some of the most famous malware attacks, there is no shortage of malicious programs written for them. Keep your computer safe from some of the most common types