I’ve started working on this in Notion after Medium. I’m not sure how long it’ll take, but once it’s done, it’s going to be one of the best bug hunting methodologies you’ve seen. It’ll have 80+ modules, including private methods I’ve never shared before. Just keep supporting on…
Caching (Redis, Memcached)
What is Caching?
Caching is the process of storing frequently accessed data in a temporary storage (cache) so future requests can be served faster. Instead of querying the database every time, the system retrieves data from the cache, reducing…
How Does SSH Work?
What actually happens when you type ssh user@host?
The visual below lays out the sequential steps that occur between the SSH client and the SSH server.
Here’s a breakdown of the main events that occur during an SSH connection:
𝟭) 𝗞𝗲𝘆 𝗲𝘅𝗰𝗵𝗮𝗻𝗴𝗲…
Authentication & Authorization (OAuth, JWT, Sessions)
What is Authentication?
Authentication is the process of verifying the identity of a user or system. It ensures that the person or application trying to access a system is who they claim to be.
→ Example: Logging in with a…
Big thanks to @Antisy_Training@BHinfoSecurity for sponsoring this video and their continued support of the channel! Jump into "Pay Forward What You Can" training at Antisyphon Training, at whatever cost makes sense for you! jh.live/pfwyc
Why I use Mosh over SSH when traveling 👇
SSH dies on flaky networks. Mosh doesn’t. You can switch networks, go offline briefly, and still maintain a live session.
Built for travel, trusted by remote developers, and essential for all you digital nomads.
How do we design effective and safe APIs?
To understand some of the key principles and best practices of API design, Let's analyze a social media platform example:
• 𝗥𝗲𝘀𝗼𝘂𝗿𝗰𝗲 𝗻𝗮𝗺𝗶𝗻𝗴
↳ Clarity is key when creating APIs. Adopting simple resource names, like /users…
One liner for finding files
subfinder -d domain.com -silent | \
while read host; do \
for path in /config.js /config.json /app/config.js /settings.json /database.json /firebase.json /.env /.env.production /api_keys.json /credentials.json /secrets.json…
2K Followers 1K FollowingCybersecurity Enthusiast | Ethical Hacker | Bug Hunter | Entrepreneur | IG @iShowCybersecurity (49k) |
May the Encryption be with you
6K Followers 4K FollowingThe goal: making money, doing what I love, with people l enjoy,making an impact on the world and growing as a person
Life is better with a Rottweiler .Mapunjan✊
119 Followers 1K FollowingCertified API Security Analyst | Technical Support Officer | Technical Writer || Open Source Contributor @Codecademy || Former Tech Attache at @swahilipothub
9 Followers 739 FollowingNão importa onde você esteja,junte-se a All,ganhe mais de 200 por dia,se estiver interessado,por favor,tome a iniciativa de conversar comigo em particular!
187K Followers 105 FollowingWe're sharing/showcasing best of @github projects/repos. Follow to stay in loop. Promoting Open-Source Contributions. UNOFFICIAL, but followed by github
37K Followers 125 FollowingDetect real, exploitable vulnerabilities. Harness the power of Nuclei for fast and accurate findings without false positives.
14K Followers 265 FollowingC•S INSTRUCTOR//Purple Teamer // InfoSec //Documenting My Journey into Cybersecurity & I Post Educative Content relating to IT(it) // Turn on Post Notis 🔔
11K Followers 5 Following#1 - Cybersecurity blogging community curating knowledge from wonderful & insightful infosec writers! Join the club right now. 🚀
18K Followers 222 FollowingAnda boleh melakukan segala-galanya dari syurga ke bumi, wanita kecil!!
If you have any questions, please contact me
https://t.co/MkzsavUU9V
48K Followers 20 FollowingWelcome to CyberPatron. Your #1 Cybersecurity Network official X account. We bring you the best Cybersecurity Contents, Training and Mentorship. 💻🗝️
5K Followers 4K FollowingCreated unto good works, which God hath before ordained that we should walk in them. #People #Planet #Peace #Prosperity #KingdomWitness
9K Followers 419 FollowingFirst Private CERT in Europe. Tweets are about vulnerability and cyber threats. Corporate account: @OrangeCyberDef / @OrangeCyberFR GPG KeyID: 0xBD54B276
15K Followers 521 FollowingRE and More by Alexey Kleymenov (https://t.co/s1pWjL46AW). Private classes and group workshops in malware analysis and reverse engineering. #infosec #malware
21K Followers 1 FollowingRME-DisCo research group from University of Zaragoza. Special interest on software and systems security. Link to our Telegram channel: https://t.co/UmkcXVG8MU
89K Followers 910 FollowingProgrammer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
61K Followers 804 FollowingSecurity Researcher. Previously Google Project Zero and TAG | 0days all day. Love all things bytes, assembly, and glitter. she/her.
No recent Favorites. New Favorites will appear here.