ArcNET
1.49K subscribers
64 photos
65 links
Tech news, tips, guides, and community updates, all in one place.

Join our community
https://t.me/arcnet_am_community
Download Telegram
Why Web2 Still Owns Web3 (And Always Will)

Why Web2 outperforms Web3 in security, UX, and architecture. A technical breakdown of why decentralization isn't replacing reliability.

https://arcnet.am/post/2

#bug_hunt #web2 #cybersecurity
4❀2
Nmap: From Basic Discovery to Advanced Penetration Testing

A complete technical reference on Nmap for network discovery, attack surface enumeration, and penetration testing. Covers core concepts, essential commands, port states, scan types

https://arcnet.am/post/4

#nmap #pentest
3πŸ”₯2
Offensive Hacking Handbook: Subdomains, SQLi, IDORs & Hash Cracking

Systematic subdomain enumeration using certificate transparency, bruteforcing, JavaScript analysis, and OSINT methodologies

https://arcnet.am/post/5

#sqli #idors #hash_cracking #subdomains
3❀2
Linux Fundamentals: Structure, Commands, and Core Concepts

Learn the fundamentals of Linux including filesystem structure, basic commands, networking tools, SSH access, and system management essential for beginners and cybersecurity professionals.

https://arcnet.am/post/6

#linux #structure
2πŸ”₯2
Networking Basics: OSI, TCP/IP, Protocols & Ports

A beginner-friendly guide to networking fundamentals, covering the OSI and TCP/IP models, common protocols, and essential ports to help you understand how data moves across networks.

https://arcnet.am/post/8

#networking #osi7 #tcpip #protocol #port
3❀2πŸ‘1
3 EASY BUGS FOR QUICK WINS IN BUG BOUNTY

Three vulnerabilities, one target. From injecting malicious configs into Swagger UI to hijacking an abandoned subdomain and bypassing API auth with a single header β€” here's how I found them and why they matter.

https://arcnet.am/post/10

#htmli #swagger
3πŸ”₯2
When Online Orders Cost Nothing: Lessons from a Platform Vulnerability

A case study on how weak email validation and authentication flaws can lead to unexpected vulnerabilities in online platforms.

https://arcnet.am/post/16

#web_security #vulnerability
3πŸ”₯2
Modern Unix in 2026: What's Replacing Classic Linux Command-Line Tools

A guide to modern CLI tools written in Rust and Go that replace classic Unix commands grep, ls, cat, find, top with faster performance and smarter defaults. Includes installation steps and shell aliases.

https://arcnet.am/post/19

#modern_unix #open_source #cli #terminal #linux
3πŸ”₯2
EASY ACCOUNT TAKEOVER USING IDOR (Bug Bounty)

Changing one number in a URL shouldn't give you someone else's accountβ€”but it often does. Insecure Direct Object Reference (IDOR) remains one of the most critical yet overlooked web vulnerabilities, frequently leading to full account takeover with minimal effort.

https://arcnet.am/post/7

#bug_hunt #idors
3πŸ”₯2
THE BUG BOUNTY BLUEPRINT: HACK LEGALLY, GET PAID (2026 EDITION)

Complete bug bounty guide for 2026: platforms that pay, real-world vulnerabilities, and the hacker mindset. Learn how to find critical bugs and get paid legally.

https://arcnet.am/post/11

#bug_bounty
3πŸ”₯2
How I Found a Critical Swagger Exposure in a Web Application

During testing, I discovered that the test environment's Swagger UI at https://[test-api-domain]/swagger/index.html is fully accessible to anyone on the internet without any authentication. This endpoint returns a complete OpenAPI/Swagger specification containing all API endpoints, request/response schemas, data models, and internal architecture details.

https://arcnet.am/post/18

#swagger #api #web_security
14😱2πŸ”₯1
Web Security Handbook: 16 Exploits You Must Know

Master the 16 most critical web vulnerabilities every hacker and security professional must know. From SQL Injection to SSRF, this hands-on guide breaks down how they work, why they matter, and how to find them .

https://arcnet.am/post/3

#exploit #websecuirty
4πŸ”₯3
πŸš€ Welcome to ArcNET β€” a tech community built by enthusiasts, for enthusiasts.

We are a technology forum where developers, engineers, IT professionals, and tech lovers come together to share knowledge, solve problems, and stay ahead of the curve. πŸ’‘

πŸ”§ What We Do
πŸ“° Tech news and industry updates
πŸ“ In-depth tutorials and how-to guides
βš–οΈ Product reviews and comparisons
πŸ’¬ Developer discussions and Q&A
🀝 Networking with like-minded tech professionals

Whether you're a beginner or a seasoned pro, ArcNET is your space to learn, share, and grow. 🌱

🌐 Visit us: arcnet.am
111πŸ’˜3πŸ‘¨β€πŸ’»2❀1πŸ‘1πŸ”₯1
ArcNET pinned Β«πŸš€ Welcome to ArcNET β€” a tech community built by enthusiasts, for enthusiasts. We are a technology forum where developers, engineers, IT professionals, and tech lovers come together to share knowledge, solve problems, and stay ahead of the curve. πŸ’‘ πŸ”§ What…»
Best GitHub Repositories for Claude Code: 9 Essential Tools for Developers in 2026

Claude Code is powerful out of the box, but these 9 open-source repos take it to another level. From persistent memory and design intelligence to spec-driven development and workflow automation, here's everything you need to build faster and better.

https://arcnet.am/post/25

#open_source #claude_code #context_engineering
23❀4πŸ‘Ύ1
How I Broke a Production Dashboard In Few Minutes

A simple API test turned into a full dashboard failure in under few minutes. No exploits, no hacks , just a missing limit.

https://arcnet.am/post/36

#rate_limiting #bug_bounty #api
16πŸ”₯3❀1😁1πŸ™Š1
Advanced NoSQL Injection

A Comprehensive Practitioner's Guide to Exploitation, Bypasses, and Strategy

https://arcnet.am/post/38

#hacking #attacks #bug_bounty #web_security #api
7πŸ”₯4❀‍πŸ”₯2
SSRF for reconnaissance of the target's local network

How to use SSRF for a local network reconnaissance and which impacts have this vulnerability

https://arcnet.am/post/34

#hacking #bug_bounty #web_security #api
9❀‍πŸ”₯3πŸ”₯3❀2
How to encode a file via Vim Linux file editor?

Honestly it's not that difficult, but lots of people don't know about the functions vim has, which is sad. Vim is a really good redactor (I use nano btw :))

https://arcnet.am/post/40

#algorithms #encryption #vim #linux #cryptography
10πŸ”₯3❀‍πŸ”₯2❀1
Using a Smartphone as a BadUSB

How to use an Android Smartphone as a BadUSB

https://arcnet.am/post/41

#hacking #attacks #badusb #hid #android
10πŸ”₯3❀‍πŸ”₯2
whoami? Yii survivor

How a single 'temporary' debug token exposed an entire distributed network.

https://arcnet.am/post/43

#hacking #web_security #api #algorithms #attacks
11❀4❀‍πŸ”₯2