This repo contains all variants of information security & Bug bounty & Penetration Testing write-up design for beginners or newcomers who are confused or don’t know which keyword to search.
All these articles’ links are fetched from medium.com (A popular blog sharing site for a variety of different interest people)
Note: All of them were generated by an automation tool so maybe inappropriate articles are also included (feel free to avoid them) This repo is still in a development state, so any help or Idea would be appreciated
Android Application & Related ArticlesAPI Related ArticlesApplication Security Related ArticlesAccount Takeover ArticlesAuthentication & Authorization ArticlesHost Header Injection AttackBlockchain Security Related ArticlesArticles Contains Keyword ‘bounty’Cache Poisoning Related ArticlesClickjacking Related ArticlesCloud Security Related ArticlesCross-Site Request Forgery (CSRF)Data BreachDeserializationDenial of Service (DoS)Graphql HackingArticles Contains Keyword ‘Hacking’Articles Contains Keyword ‘How to’Insecure Direct Object Reference (IDOR) & Broken Access Control IssueArticles Contains Keyword ‘infosec’Injection Related Articles
For more information click here.
Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…
Image credit:pexels.com If you think back to the early days of personal computing, you probably…
In an era defined by technological innovation, the way people handle and understand money has…
The online world becomes more visually driven with every passing year. Images spread across websites,…
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…