Forwarded from Ge'ez Tech® ግዕዝ ቴክ
geeztech+htb_phone.jpg
94.9 KB
Let me share you my best Wallpaper ever(i made it)🥲
When You try to find Bugs or Flags, and sigegmbachu, you just look at your phone and back to hunting😂🥲, try it, gegmobing after 2 week i have got amazing bugs🫶
#geeztech @geeztechgroup
When You try to find Bugs or Flags, and sigegmbachu, you just look at your phone and back to hunting😂🥲, try it, gegmobing after 2 week i have got amazing bugs🫶
#geeztech @geeztechgroup
⚡6
Ge'ez Tech® ግዕዝ ቴክ
geeztech+htb_phone.jpg
btw guys, almost 86% of web app has at least one serious vulnerability in their system. Back in days, there wasn't that much Job for hackers. They usually hunt local gigs or create RAAS (ransomware as a service) which will be sold on the dark web. Nowadays, there is a huge increase in cyber security professionals and it is expected to rise by 25% of the current market. Increase in technological advancement means also increase in security threat.
🔥5
The world's largest directory of tools and resources for startups and entrepreneurs.
https://startupstash.com/
#site #resources
https://startupstash.com/
#site #resources
Startup Stash
StartupStash is a curated directory of tools and resources to build your startup. All the startup resources you need to build a killer product.
❤2🔥2
The Wandering Soul
The_Car_Hackers_Handbook_A_Guide_for_the_Penetration_Tester_PDF.pdf
a glimpse from the book
🔥6
Mira
a nightmare
when i see this kind of things it reminds how i started my journey. here goes the story:
It was back then when i was 12 years old that my parents gave me a huawei smartphone. I didn't know what it is capable of and spent most of my day playing games. It was summer, and most of uni students were back home. Then i got the chance of spending a time with software engineering student at BDU. I wanted some apps from his phone, and sent what i thought at that time 'weird app' called "Github" accidentally. I heck knew nothing abt github nevertheless i created an account. It was back then and there was a limited access to Internet so that i needed to go to teachers' staff and local cafes. Unfortunately, it gets crowded everytime. I just said i gotta get what i came for, and that was the first time I did my first ever DoS attack. I used to filter their MAC address which uses high traffic and block them instantly. My first day in highschool i changed the networking scheme of the school and got almost suspended. I thought it was cool, and little did I know i was being very wrong.
TAKEAWAY: With every great power comes great responsibility. Think about your actions, because they have consequences. Just because you're capable of causing problem doesn't mean you gotta do it without proper authorization (new cyber-security professionals keep this in mind 😉)
#advices #thought
@Mi_Ra_Ch
It was back then when i was 12 years old that my parents gave me a huawei smartphone. I didn't know what it is capable of and spent most of my day playing games. It was summer, and most of uni students were back home. Then i got the chance of spending a time with software engineering student at BDU. I wanted some apps from his phone, and sent what i thought at that time 'weird app' called "Github" accidentally. I heck knew nothing abt github nevertheless i created an account. It was back then and there was a limited access to Internet so that i needed to go to teachers' staff and local cafes. Unfortunately, it gets crowded everytime. I just said i gotta get what i came for, and that was the first time I did my first ever DoS attack. I used to filter their MAC address which uses high traffic and block them instantly. My first day in highschool i changed the networking scheme of the school and got almost suspended. I thought it was cool, and little did I know i was being very wrong.
TAKEAWAY: With every great power comes great responsibility. Think about your actions, because they have consequences. Just because you're capable of causing problem doesn't mean you gotta do it without proper authorization (new cyber-security professionals keep this in mind 😉)
#advices #thought
@Mi_Ra_Ch
⚡10👍2
Forwarded from Ge'ez Tech® ግዕዝ ቴክ
#Tip
One of Beginners Problem is, they think we hack by tools, Nooooo way!
you hack if u understand the system and make ur brain do stuffs, rather than waiting bloodhound or Zap scan results.
The tools are just to make things quick and to check the thing in ur mind እየሮጠ.
So next time u hack, try to understand the system(like the developer), undertand the functionality of all buttons ,link, redirections, popups, endpoints....
Then u can craft ur attacks with ur amazing tools😊
HAPPY HACKING❤️
#geeztech @geeztechgroup
One of Beginners Problem is, they think we hack by tools, Nooooo way!
you hack if u understand the system and make ur brain do stuffs, rather than waiting bloodhound or Zap scan results.
The tools are just to make things quick and to check the thing in ur mind እየሮጠ.
So next time u hack, try to understand the system(like the developer), undertand the functionality of all buttons ,link, redirections, popups, endpoints....
Then u can craft ur attacks with ur amazing tools😊
HAPPY HACKING❤️
#geeztech @geeztechgroup
🔥6
found this wandering through my older posts from different channels. Good books for data analytics
#dataAnalytics #dataScience #books
@Mi_Ra_Ch
#dataAnalytics #dataScience #books
@Mi_Ra_Ch
Bug Bounty Hunting for Web Security.pdf
8.9 MB
for someone who was listening to yesterday's codenight vc, this might be a great Book for BBP
#books
@Mi_Ra_Ch
#books
@Mi_Ra_Ch
⚡9👍2