π Windows+Kali Linux == Winlux - Seamless integration between Windows and Kali Linux
π https://hacklido.com/blog/798-windowskali-linux-winlux-seamless-integration-between-windows-and-kali-linux
π https://hacklido.com/blog/798-windowskali-linux-winlux-seamless-integration-between-windows-and-kali-linux
HACKLIDO
Run Kali Linux in Windows - Winlux | Seamless integration between Windows and Kali Linux
I recently set up my device to run Windows and Kali Linux seamlessly using WSL2, which has streamlined my workflow. Iβve tried various setups including i...
π9β€1
π You Can Plant Flowers And Build Cyber Resilisence
π https://hacklido.com/blog/799-you-can-plant-flowers-and-build-cyber-resilisence
π https://hacklido.com/blog/799-you-can-plant-flowers-and-build-cyber-resilisence
HACKLIDO
You Can Plant Flowers And Build Cyber Resilisence
Abeer Khedr (CISO at National Bank of Egypt) has over two decades of experience in information security and IT consulting. She has led projects in a range...
π Exploiting Cross-Site Scripting XSS vulnerabilities for Bug Bounty β Portswigger | 2024
π https://hacklido.com/blog/808-exploiting-cross-site-scripting-xss-vulnerabilities-for-bug-bounty-portswigger-2024
π https://hacklido.com/blog/808-exploiting-cross-site-scripting-xss-vulnerabilities-for-bug-bounty-portswigger-2024
HACKLIDO
Exploiting Cross-Site Scripting XSS vulnerabilities for Bug Bounty β Portswigger | 2024
The traditional way to prove that youβve found a cross-site scripting vulnerability is to create a popup using the alert() function. This isnβt because XS...
π1
π How to Find more Vulnerabilities β Source Code Auditing Explained
π https://hacklido.com/blog/810-how-to-find-more-vulnerabilities-source-code-auditing-explained
π https://hacklido.com/blog/810-how-to-find-more-vulnerabilities-source-code-auditing-explained
HACKLIDO
How to Find more Vulnerabilities β Source Code Auditing Explained
Introduction Whitebox penetration testing can be intimidating. Complex web applications may contain hundreds of thousands of lines of code and deciphering...
π How I Found My First RCE | CVE-2023-46604 in Apache ActiveMQ
π https://hacklido.com/blog/814-how-i-found-my-first-rce-cve-2023-46604-in-apache-activemq
π https://hacklido.com/blog/814-how-i-found-my-first-rce-cve-2023-46604-in-apache-activemq
HACKLIDO
How I Found My First RCE | CVE-2023-46604 in Apache ActiveMQ
How I Found My First RCE .Ψ§ΩΨ³ΩΨ§Ω
ΨΉΩΩΩΩ
ΩΨ±ΨΩ
Ω Ψ§ΩΩΩ ΩΨ¨Ψ±ΩΨ§ΨͺΩ ΩΨ§ΩΨ΅ΩΨ§Ω ΩΨ§ΩΨ³ΩΨ§Ω
ΨΉΩΩ Ψ±Ψ³ΩΩ Ψ§ΩΩΩ Ψ³ΩΨ―ΩΨ§ Ω
ΨΩ
Ψ― As-salamu alaykum everyone! In this article, Iβll talk...
β€2π₯1
π What Makes A Good Security Researcher?
π https://hacklido.com/blog/815-what-makes-a-good-security-researcher
π https://hacklido.com/blog/815-what-makes-a-good-security-researcher
HACKLIDO
What Makes A Good Security Researcher?
Based at the Nanyang Technological University, Jakub Pruzinec (Security Researcher) has undertaken research in OS security, web security and malware analys...
π€1π1
π Should Cybersecurity Proffessionals Be Licensed?
π https://hacklido.com/blog/816-should-cybersecurity-proffessionals-be-licensed
π https://hacklido.com/blog/816-should-cybersecurity-proffessionals-be-licensed
HACKLIDO
Should Cybersecurity Proffessionals Be Licensed?
There are numerous certifications that cybersecurity professionals can acquire if they want to validate their expertise and build trust with customers. But...
π3
π How Threar Actors Apply Pressure From All Angles
π https://hacklido.com/blog/817-how-threar-actors-apply-pressure-from-all-angles
π https://hacklido.com/blog/817-how-threar-actors-apply-pressure-from-all-angles
HACKLIDO
How Threar Actors Apply Pressure From All Angles
βFor most US individuals out there doubting us, we probably have your personal data.β This was the defiant statement from cybercriminal group RansomHub,...
π How Do You Build A Career As Security Researcher?
π https://hacklido.com/blog/819-how-do-you-build-a-career-as-security-researcher
π https://hacklido.com/blog/819-how-do-you-build-a-career-as-security-researcher
HACKLIDO
How Do You Build A Career As Security Researcher?
Security research is a varied field β with no two researchers working in exactly the same way. This makes it challenging for aspiring researchers to start...
π What is insecure deserialization | How to exploit in Php & Java environment
π https://hacklido.com/blog/822-what-is-insecure-deserialization-how-to-exploit-in-php-java-environment
π https://hacklido.com/blog/822-what-is-insecure-deserialization-how-to-exploit-in-php-java-environment
HACKLIDO
What is insecure deserialization | How to exploit in Php & Java environment
Iβll cover what insecure deserialization is and describe how it can potentially expose websites to high-severity attacks. Weβll highlight typical scenarios...
π1
πΉ If you are a blog writer, writing your blogs somewhere else - wait no more. Migrate or copy them over to hacklido and relax. We will take care about marketing, promoting it to right audience and get free SEO upgrades to your writings through editorial team.
βοΈ Start Writing Now!
βοΈ Start Writing Now!
β€8π1
π JS Recon - A Javascript treasure hunt
π https://hacklido.com/blog/823-js-recon-a-javascript-treasure-hunt
π https://hacklido.com/blog/823-js-recon-a-javascript-treasure-hunt
HACKLIDO
JS Recon - A javascript treasure hunt
Hey there, fellow readers! Itβs been a while, but Iβm back! Today, weβre going to dive into something fascinating β βJavascriptβ. In this blog, youβll learn...
π How Passion Drives Momentum And Success In Cybersecurity
π https://hacklido.com/blog/824-how-passion-drives-momentum-and-success-in-cybersecurity
π https://hacklido.com/blog/824-how-passion-drives-momentum-and-success-in-cybersecurity
HACKLIDO
How Passion Drives Momentum And Success In Cybersecurity
With 15 years of experience as a pen tester and zero day hunter, Mukhammad Khalilov (Head of Offensive Security at Help AG) is dedicated to staying ahead...
π1
Hello Everyone π
After receiving a lot of requests, we have decided to turn Hacklido's bi-monthly roundup newsletter into a Weekly Cyber newsletter issue! Effective from June 1 (Expect 1st issue).
If you haven't subscribed, do it now!
π https://hacklido.substack.com/
The free newsletter will contain π· Job updates, recommended cybersec reads, news, latest research articles, videos, latest tools, etc.
After receiving a lot of requests, we have decided to turn Hacklido's bi-monthly roundup newsletter into a Weekly Cyber newsletter issue! Effective from June 1 (Expect 1st issue).
If you haven't subscribed, do it now!
π https://hacklido.substack.com/
The free newsletter will contain π· Job updates, recommended cybersec reads, news, latest research articles, videos, latest tools, etc.
π9β€3π₯1
π§ CyberWeekly 1' June | Issue #1
FlyingYeti, Detecting Sandwich attacks in Ethereum, Hacking WordPress, Bug Bounty in 2024, flipper zero cheat sheet, cybersecurity job updates and more.
π https://hacklido.substack.com/p/cyberweekly-1-june-issue-1
FlyingYeti, Detecting Sandwich attacks in Ethereum, Hacking WordPress, Bug Bounty in 2024, flipper zero cheat sheet, cybersecurity job updates and more.
π https://hacklido.substack.com/p/cyberweekly-1-june-issue-1
β€1
π A New Wave Of AI-Native Security Platforms - Cisco Hypershield, Cyware Quarterback & CrowdStrike Falcon XDR
π https://hacklido.com/blog/826-a-new-wave-of-ai-native-security-platforms-cisco-hypershield-cyware-quarterback-crowdstrike-falcon-xdr
π https://hacklido.com/blog/826-a-new-wave-of-ai-native-security-platforms-cisco-hypershield-cyware-quarterback-crowdstrike-falcon-xdr
HACKLIDO
A New Wave Of AI-Native Security Platforms - Cisco Hypershield, Cyware Quarterback & CrowdStrike Falcon XDR
In recent weeks, weβve seen several new AI-powered cybersecurity platforms and tools launch into the market. This marks a new moment in the convergence of...
π Do Cybercriminals Collaborate And Build A Community
π https://hacklido.com/blog/827-do-cybercriminals-collaborate-and-build-a-community
π https://hacklido.com/blog/827-do-cybercriminals-collaborate-and-build-a-community
HACKLIDO
Do Cybercriminals Collaborate And Build A Community
When we interviewed Isabelle Meyer (Co-Founder and Co-CEO at ZENDATA Cybersecurity), we asked why she thinks events like Black Hat MEA are so valuable. She...
π The Importance Of Finding Your Purpose In Cybersecurity
π https://hacklido.com/blog/828-the-importance-of-finding-your-purpose-in-cybersecurity
π https://hacklido.com/blog/828-the-importance-of-finding-your-purpose-in-cybersecurity
HACKLIDO
The Importance Of Finding Your Purpose In Cybersecurity
A career in cybersecurity is never smooth sailing. Itβs just not set up that way β conflict is baked into the fabric of the job, and every professional in...
β€2