Skip to content

Security Cipher

Menu
  • Home
  • Blog
  • About Us
  • Resources
    • Penetration Testing Roadmap
    • Web Application Security Checklist
    • OWASP Top 10 for LLM Applications
    • LLM AI Security Checklist
    • Security Tools
    • Penetration Testing Tricks
    • Secure Code Explain
    • Vulnerability Explain
    • AWS Cloud Security Checklist
  • My Resume
Contact Us
Read more about the article Top Recon Tools for Bug Bounty Hunters

Top Recon Tools for Bug Bounty Hunters

  • Post author:Piyush Kumawat
  • Post published:November 21, 2023
  • Post category:Bug Bounty/Default/Ethical Hacking/Hacking
  • Post comments:0 Comments

In this blog, we explore top-tier reconnaissance tools that empower bug bounty hunters. From Shodan's IoT device insights to Waymore's web application vulnerability identification, each tool in this arsenal plays…

Continue ReadingTop Recon Tools for Bug Bounty Hunters
Read more about the article How to Write a Killer Pentest Report

How to Write a Killer Pentest Report

  • Post author:Piyush Kumawat
  • Post published:August 5, 2023
  • Post category:Bug Bounty/Default/Ethical Hacking
  • Post comments:0 Comments

Hey there! So, you're ready to dive into the world of pentest reporting? Awesome! In this section, we'll introduce you to the exciting realm of pen-testing reports. Alright, let's get…

Continue ReadingHow to Write a Killer Pentest Report
Read more about the article Basic Networking – Network Topologies

Basic Networking – Network Topologies

  • Post author:Piyush Kumawat
  • Post published:September 1, 2022
  • Post category:Ethical Hacking
  • Post comments:0 Comments

This article seeks to serve as a thorough introduction to network topologies. Understanding the attacks and defenses requires understanding networking technologies, which is beneficial and essential. Network topologies serve as…

Continue ReadingBasic Networking – Network Topologies
Read more about the article Best way to create a Phishing Page | AdvPhishing

Best way to create a Phishing Page | AdvPhishing

  • Post author:Piyush Kumawat
  • Post published:September 1, 2022
  • Post category:Ethical Hacking
  • Post comments:4 Comments

This article aims to be a comprehensive guide for Adv-Phis tool. In this article, we will cover topics such as Introduction to Adv-Phis, and how to install Adv-Phis on Android…

Continue ReadingBest way to create a Phishing Page | AdvPhishing
Read more about the article Install Kali NetHunter on Non-Rooted Android Devices

Install Kali NetHunter on Non-Rooted Android Devices

  • Post author:Piyush Kumawat
  • Post published:September 1, 2022
  • Post category:Default/Ethical Hacking
  • Post comments:0 Comments

This article aims to be a comprehensive guide on installing Nethunter on an Non-Rooted Android Devices. In this article we will cover topics such as , Introduction to Nethunter, how…

Continue ReadingInstall Kali NetHunter on Non-Rooted Android Devices
Read more about the article Install OWASP Juice Shop on Kali Linux – Guide for Burp Suite

Install OWASP Juice Shop on Kali Linux – Guide for Burp Suite

  • Post author:Piyush Kumawat
  • Post published:June 8, 2020
  • Post category:Burp Suite/Ethical Hacking
  • Post comments:1 Comment

This article is a part of the Guide for Burp Suite series. Within the previous article, we see how you can install Burp's CA (Certificate Authority) Certificate in the Firefox…

Continue ReadingInstall OWASP Juice Shop on Kali Linux – Guide for Burp Suite
Donate

Donate

Buy me a Coffee
Donate

Penetration Testing Services - Fiverr

Buy me a Coffee
Image Link

Penetration Testing Services

penetration Testing Services
Image Link

Web Application Security Quiz

Web Application Security Quiz
Image Link

Daily Bug Bounty Writeups - Twitter

Daily Bug Bounty Writeups
Image Link

Download our Latest Android Application

Guide for Penetration Testing
Image Link

Daily Bug Bounty Writeups - Telegram

Daily Bug Bounty Writeups

Author

Piyush
Senior Product Security Engineer

Ethical Hacker || Penetration Tester || Gamer || Blogger || Application Security Engineer

READ ARTICLE
Tweets by bountywriteups
Donate

Donate

Buy me a Coffee

Recent Posts

  • 🛠️ Reconnaissance and Vulnerability Scanning Script🛡️
    🛠️ Reconnaissance and Vulnerability Scanning Script🛡️
    August 14, 2024/
    1 Comment
  • LLM Agents can Autonomously Hack Websites ?
    LLM Agents can Autonomously Hack Websites ?
    February 22, 2024/
    0 Comments
  • $600 Simple MFA Bypass – Graphql
    $600 Simple MFA Bypass – Graphql
    February 19, 2024/
    0 Comments

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
logo name

Learn penetration Testing …

Instagram Twitter Youtube Telegram Linkedin

Useful Links

Blogs
About
Contact

Recent Post

  • 🛠️ Reconnaissance and Vulnerability Scanning Script🛡️
  • LLM Agents can Autonomously Hack Websites ?
  • $600 Simple MFA Bypass - Graphql

Subscribe Now

Don’t miss our future updates! Get Subscribed Today!

Subscription Form

By entering your email, you agree to our terms & Conditions and Privacy policy.

©2023. Security Cipher. All Rights Reserved.

Privacy Policies
Terms & Conditions