Skip to content
Security Cipher
Menu
Home
Blog
About Us
Resources
Penetration Testing Roadmap
Web Application Security Checklist
OWASP Top 10 for LLM Applications
LLM AI Security Checklist
Security Tools
Penetration Testing Tricks
Secure Code Explain
Vulnerability Explain
AWS Cloud Security Checklist
My Resume
Contact Us
Security Cipher
Home
Blogs
🛠️ Reconnaissance and Vulnerability Scanning Script🛡️
🛠️ Reconnaissance and Vulnerability Scanning Script🛡️
•
August 14, 2024
LLM Agents can Autonomously Hack Websites ?
LLM Agents can Autonomously Hack Websites ?
•
February 22, 2024
$600 Simple MFA Bypass – Graphql
$600 Simple MFA Bypass – Graphql
•
February 19, 2024
Exploring Application Security with SAST, DAST, SCA, and IAST
Exploring Application Security with SAST, DAST, SCA, and IAST
•
January 3, 2024
Top Recon Tools for Bug Bounty Hunters
Top Recon Tools for Bug Bounty Hunters
•
November 21, 2023
Mastering WordPress Penetration Testing: A Step-by-Step Guide
Mastering WordPress Penetration Testing: A Step-by-Step Guide
•
August 14, 2023
Enhance WordPress Security: Comprehensive Guide
Enhance WordPress Security: Comprehensive Guide
•
August 12, 2023
How to Write a Killer Pentest Report
How to Write a Killer Pentest Report
•
August 5, 2023
ZeusCloud – OpenSource Cloud Security Platform
ZeusCloud – OpenSource Cloud Security Platform
•
July 15, 2023
Threat Modeling : Everything You Need to Know for Web Application Security
Threat Modeling : Everything You Need to Know for Web Application Security
•
March 11, 2023
How to Conduct a Successful Penetration Test: A Step-by-Step Guide
How to Conduct a Successful Penetration Test: A Step-by-Step Guide
•
February 11, 2023
OSV-Scanner: Protecting Your Open-Source Dependencies
OSV-Scanner: Protecting Your Open-Source Dependencies
•
January 30, 2023
Dastardly – Web Application Security Scanner – CI/CD
Dastardly – Web Application Security Scanner – CI/CD
•
January 23, 2023
Metlo – Open Source API Security Platform
Metlo – Open Source API Security Platform
•
January 17, 2023
All about Burp Suite
All about Burp Suite
•
January 12, 2023
Top Burp Suite Extensions used by Penetration Testers
Top Burp Suite Extensions used by Penetration Testers
•
December 28, 2022
Cloud Security Configuration Review: A Comprehensive Guide
Cloud Security Configuration Review: A Comprehensive Guide
•
December 20, 2022
The Importance of Secure Coding: Best Practices for Developers
The Importance of Secure Coding: Best Practices for Developers
•
December 15, 2022
ChatGPT: The Ultimate Tool for Penetration Testers
ChatGPT: The Ultimate Tool for Penetration Testers
•
December 10, 2022
All about Ethical Hacking
All about Ethical Hacking
•
September 10, 2022
Extract Android Application’s Database
Extract Android Application’s Database
•
September 10, 2022