Forwarded from Yekolo Temari (α¨αα α°ααͺ)
#Cybertalents #NewYear2025 challenge have started.
It has started off with #3 challenges with #General, #webSecurity and #machine category.
Good Luck π
It has started off with #3 challenges with #General, #webSecurity and #machine category.
Good Luck π
Forwarded from Mira
i am not into bugbounty, but check this out if you are thinking to start:
https://infosecwriteups.com/my-first-year-in-bug-bounty-10994de47849
#blogs
https://infosecwriteups.com/my-first-year-in-bug-bounty-10994de47849
#blogs
Medium
My First year in Bug Bounty π¨βπ»
Hello all, In this write-up I summarizes my year in bugbounty on all big platform, self hosted and all the numbers, bugs submittedβ¦
π₯2
Forwarded from Tech World
π Graduating from the 3rd Cyber Talent INSA Summer Camp! π
Just a few months ago, I was a Python beginner who had never even heard of Linux. Fast forward to today, and Iβm proud to say Iβve graduated from the 3rd Cyber Talent INSA Summer Camp!
This one month journey was packed with challengesβlate nights, tough problems, and moments of doubt. But every challenge became an opportunity to learn, grow, and push my limits. Working on my project, DNA Vault (a secured DNA storage system), was both exciting and rewarding.
Living on campus for the first time taught me independence and resilience, helping me adapt to a new environment while discovering my true passion for cybersecurity and technology. The support of talented peers and inspiring mentors made this journey unforgettable.
Looking back now, I canβt believe how far Iβve come. The person who joined this camp is not the same person graduating today. This experience has shaped me, both as a programmer and as a person.
Iβm deeply grateful to the INSA Summer Camp team, my mentors, and my peers for their guidance and encouragement. This isnβt just the end of a program itβs the start of a new and exciting chapter in my tech journey. Hereβs to taking on more challenges and continuing to grow!
#INSA #CyberTalent #Graduation #Cybersecurity #GrowthJourney #Gratitude
lets connect in linkedin linkedin.com/in/lidiya-bokona-68621831b
Join us @tech_life_01
Just a few months ago, I was a Python beginner who had never even heard of Linux. Fast forward to today, and Iβm proud to say Iβve graduated from the 3rd Cyber Talent INSA Summer Camp!
This one month journey was packed with challengesβlate nights, tough problems, and moments of doubt. But every challenge became an opportunity to learn, grow, and push my limits. Working on my project, DNA Vault (a secured DNA storage system), was both exciting and rewarding.
Living on campus for the first time taught me independence and resilience, helping me adapt to a new environment while discovering my true passion for cybersecurity and technology. The support of talented peers and inspiring mentors made this journey unforgettable.
Looking back now, I canβt believe how far Iβve come. The person who joined this camp is not the same person graduating today. This experience has shaped me, both as a programmer and as a person.
Iβm deeply grateful to the INSA Summer Camp team, my mentors, and my peers for their guidance and encouragement. This isnβt just the end of a program itβs the start of a new and exciting chapter in my tech journey. Hereβs to taking on more challenges and continuing to grow!
#INSA #CyberTalent #Graduation #Cybersecurity #GrowthJourney #Gratitude
lets connect in linkedin linkedin.com/in/lidiya-bokona-68621831b
Join us @tech_life_01
π«‘9π€1
This media is not supported in your browser
VIEW IN TELEGRAM
π₯4π4π1
heeyaa fam
happy epiphany for those who are celebrating ππ
and btw here is the channel i created for file sharing purpose check it out : @Afr0Files
@AfroSec
happy epiphany for those who are celebrating ππ
and btw here is the channel i created for file sharing purpose check it out : @Afr0Files
@AfroSec
π3πΏ2
methodology that i used
@AfroSec
subfinder -d example.com -all -recursive > subdomain.txt
for subdomain
cat subdomain.txt | httpx-toolkit -ports 80,443,8080,8000,8888 -threads 200 > subdomains_alive.txt
live subdomain
katana -u subdomains_alive.txt -d 5 -ps -pss waybackarchive,commoncrawl,alienvault -kf -jc -fx -ef woff,css,png,svg,jpg,woff2,jpeg,gif,svg -o allurls.txt
to fetch passive urls
cat allurls.txt | grep -E '\.xls|\.xml|\.xlsx|\.json|\.pdf|\.sql|\.doc|\.docx|\.pptx|\.txt|\.zip|\.tar\.gz|\.tgz|\.bak|\.7z|\.rar|\.log|\.cache|\.secret|\.db|\.backup|\.yml|\.gz|\.config|\.csv|\.yaml|\.md|\.md5'
search for sensetive file
credit: lostsec.xyz@AfroSec
π4