❤2
💠 Web Recon : A Pentester's Guide to Information Gathering
🔗 https://hacklido.com/blog/968-web-recon-a-pentesters-guide-to-information-gathering
🔗 https://hacklido.com/blog/968-web-recon-a-pentesters-guide-to-information-gathering
HACKLIDO
Web Recon : A Pentester's Guide to Information Gathering
Information gathering or better called reconnaissance is the cornerstone of any Penetration Testing or Bug Bounty exercise. It is simply the act of colle...
❤1
💠 Directory Fuzzing and Hidden Resources: Using Ffuf Effectively
🔗 https://hacklido.com/blog/969-directory-fuzzing-and-hidden-resources-using-ffuf-effectively
🔗 https://hacklido.com/blog/969-directory-fuzzing-and-hidden-resources-using-ffuf-effectively
HACKLIDO
Directory Fuzzing and Hidden Resources: Using Ffuf Effectively
Directory fuzzing When browsing through web applications, there can be directories, or files, which are not visible when browsing through application...
❤1
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
McGraw.Hill.Gray.Hat.Hacking.2nd.EdSpunkins.pdf
12.6 MB
Gray Hat Hacking: The Ethical Hacker’s Handbook, Second Edition
OAuth 2.0 Authentication Misconfiguration
https://shellmates.medium.com/oauth-2-0-authentication-misconfiguration-dcb811062f1d
https://shellmates.medium.com/oauth-2-0-authentication-misconfiguration-dcb811062f1d
Medium
OAuth 2.0 Authentication Misconfiguration
written by Mohamed Lakhdar Metidji
❤1👍1
Pen_Testing_from_Contract_to Report_alfred_Basta,_nadine_Basta_Waqar.pdf
31.7 MB
Pen Testing from Contract to Report by Alfred Basta, Nadine Basta & Waqar Anwar, 2024
❤1
A_Beginner_s_Guide_To_Web_Application_Penetration_Testing_2025.epub
31.9 MB
A Beginner's Guide To Web Application Penetration Testing, Ali Abdollahi, 2025
❤1