Yay, I was awarded a $8,000 bounty on @Hacker0x01! https://t.co/350ZhW2EqZ #TogetherWeHitHarder
(found a vulnerability in epic games with @itsUnreleased)
(found a vulnerability in epic games with @itsUnreleased)
😱2
According To You !! Which browser is Good (Productively)
Anonymous Poll
35%
Google Chrome
8%
Microsoft edge
20%
Brave
1%
Opera
36%
Mozilla Firefox
👍2
Which career you will prefer for your future
Anonymous Poll
84%
As a Cyber Security Expert
5%
As a Govt. Job
4%
Data scientist
4%
Full Stack Developer
3%
Other
https://www.jewkoiyie.com/log4j-vulnerability-exploited/
Log4j vulnerability exploited by Iranian hackers and enabled PowerShell backdoor deployment
Log4j vulnerability exploited by Iranian hackers and enabled PowerShell backdoor deployment
👍2
CYBER CRIME | CYBER KNOWLEDGE | CYBER SECURITY | HACKING | OWASP TOP 10 | VULNERABILITY
Unexpected Apple Safari browser bug allows cross-site user tracking
-- A software bug introduced in Apple Safari 15’s implementation of the IndexedDB API could be exploited by a malicious website in a web browser to track users
-- The vulnerability, called IndexedDB Leaks, was uncovered by fraud protection software company FingerprintJS
Please Take look at Article On it :- https://www.jewkoiyie.com/apple-safar-bug-cross-site/
Unexpected Apple Safari browser bug allows cross-site user tracking
-- A software bug introduced in Apple Safari 15’s implementation of the IndexedDB API could be exploited by a malicious website in a web browser to track users
-- The vulnerability, called IndexedDB Leaks, was uncovered by fraud protection software company FingerprintJS
Please Take look at Article On it :- https://www.jewkoiyie.com/apple-safar-bug-cross-site/
#learn100 100 Days Campaign Begin
Day 1/100 of Learning hacking.
Hello To All The Group Members, I have Recently Post An Article on Basic Of Computer Networking Which is Necessary To Know For All The Beginner Hackers
Please Follow the Article to learn Basics of Computer Networking :-
https://www.jewkoiyie.com/basic-of-computer-networking-in-terms-of-hacking/
Day 1/100 of Learning hacking.
Hello To All The Group Members, I have Recently Post An Article on Basic Of Computer Networking Which is Necessary To Know For All The Beginner Hackers
Please Follow the Article to learn Basics of Computer Networking :-
https://www.jewkoiyie.com/basic-of-computer-networking-in-terms-of-hacking/
WHAT WILL YOU DO IF YOU FORGOT SOME COMMAND OF LINUX-DISTRO
man can can actually use to find out a perticular command if you forgot one like :-
man -k passwd
Use -k
Here we search keyword "passwd"
This will list all the command with having a discription "passwd".
apropos is another command which is same like man -k
https://t.co/uW1FqFozin
man can can actually use to find out a perticular command if you forgot one like :-
man -k passwd
Use -k
Here we search keyword "passwd"
This will list all the command with having a discription "passwd".
apropos is another command which is same like man -k
https://t.co/uW1FqFozin