PinnedTHM Industrial Intrusion CTF — OT Challenge WriteupCategory: ICS / OT (Industrial Control Systems / Operational Technology)Jun 30Jun 30
PinnedSecurity Teams Beware: Missing These Security Standards Can Cost You BIG !In an era where cyber threats evolve faster than ever, safeguarding your organization’s digital assets is not just a priority — it’s a…May 27May 27
PinnedThe Real Corporate Penetration Testing Process: How Companies Get Hacked Before the Hackers Do! 🚀Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP…Feb 10A response icon1Feb 10A response icon1
CMSpit — TryHackMe WalkthroughHey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP…Feb 26A response icon1Feb 26A response icon1
How to use python scripts for forensics?(Full practical explanation)Who am i ? hey guys my name is sn0x. I am 20 year old cyber security researcher |Bug hunter |machine learning |RHCSA|AWS |CEH |eWPTXv2…May 29, 2021A response icon1May 29, 2021A response icon1
Automation using python in bug bounty’s (full practical explanation).Who am i ? hey guys my name is sn0x. i am cyber security researcher |Bug hunter |machine learning |RHCSA|AWS |CEH |eWPTXv2 certified.May 16, 2021A response icon3May 16, 2021A response icon3
Introduction to bug bounty with Automation.Who am i ? hey guys my name is sn0x. i am cyber security researcher |Bug hunter |machine learning |AWS |CEH |eWPTXv2 certified.May 14, 2021A response icon2May 14, 2021A response icon2