Burping, Ffufing, and Breaking Things: TCM Security Practical Bug Bounty LabIntroduction1d agoA response icon11d agoA response icon1
OWASP Top 10 (2025) on TryHackMeRoom 1: OWASP Top 10 (2025) — IAAA FailuresFeb 5A response icon1Feb 5A response icon1
2025 FIRST & AfricaCERT Symposium in Mauritius: “When the Defenders Unite.”A Reflection on Community, Collaboration, and the Future of Africa’s CybersecurityDec 18, 2025A response icon1Dec 18, 2025A response icon1
API Security Using crAPI & Postman on OWASPAPIs have become the backbone of almost everything we use today, from mobile apps to backend services and even IoT devices in our homes…Nov 20, 2025A response icon1Nov 20, 2025A response icon1
Understanding API Security: Lessons from the API Security Fundamentals CourseDuring the API Security Fundamentals course, one thing that really hit me is how exposed and risky APIs can be if they aren’t designed and…Nov 18, 2025Nov 18, 2025
Tracing a SQL Injection Attack with Wireshark: What Hackers See, What You Can LearnWhat if a few keystrokes in a login box could expose your entire database?Jul 29, 2025Jul 29, 2025
Wireshark Network Traffic Analysis Project: DNS, TCP/UDP, HTTP/HTTPSIntroductionJul 7, 2025Jul 7, 2025
Perform System Configuration Gap AnalysisA gap analysis compares the current configuration of a system to a known security baseline — such as those provided by Microsoft — to…Jun 16, 2025Jun 16, 2025
SAL1 exam by TryHackMe… Do you wanna know? Well here is my Review.Taking the SAL1 exam by TryHackMe was quite an experience. Initially, I was nervous, especially after my experience with the BTL1 exam…Mar 31, 2025Mar 31, 2025