Blog

Latest news around the world

18

Jan'19

Hacking Cryptocurrency Miners with OSINT Techniques by Seyfullah KILIÇ

NOTE: All the methods I have explained are at your own risk Open Source Intelligence(OSINT) is one of the first …

Read More

18

Jan'19

Five Pentesting Tools and Techniques (That Every Sysadmin Should Know) by Jeremy Trinka

Step into the mind of a pentester. It’s Friday afternoon, somewhere around 2PM. The sound of whirring laptops is drowned …

Read More

18

Jan'19

A Penetration Tester’s Guide to PostgreSQL by David Hayter

PostgreSQL is an open source database which can be found mostly in Linux operating systems. However it has great compatibility …

Read More

18

Jan'19

I Used Phishing To Get My Colleagues’ Passwords. This Is What I Did by Sebastian Conijn

Did you know that 1 out of 3 people opens a phishing email, and if it’s a ‘personal’ phishing mail, …

Read More

17

Jan'19

REST: Good Practices for API Design by Jay Kapadnis, Tempus Architect

Poorly Designed REST APIs = FRUSTRATION Working as a Tempus developer and architect, I integrate with plenty of services through …

Read More

17

Jan'19

Flutter: Login App using REST API and SQFLite by Kashif Minhaj

Flutter has hit the mobile app development world like a storm. Being an Android app and web application developer, I …

Read More

17

Jan'19

The Hitchhiker’s Guide to Bug Bounty Hunting Throughout the Galaxy. v2 by Nick Jenkins

Hello friends! I want to talk a little about what has got me started on reviving my technology skills and …

Read More

16

Jan'19

How to build a deep learning model in 15 minutes by Montana Low

An open source framework for configuring, building, deploying and maintaining deep learning models in Python. As Instacart has grown, we’ve …

Read More

16

Jan'19

Understanding self in Python by Ashan Priyadarshana

Once you start using Python, there is no escaping from this word “self”. It is seen in method definitions and …

Read More

16

Jan'19

A penetration tester’s guide to subdomain enumeration by Bharath Kumar

As a penetration tester or a bug bounty hunter, most of the times you are given a single domain or …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013