Skip to content

Security Cipher

Menu
  • Home
  • Blog
  • About Us
  • Resources
    • Penetration Testing Roadmap
    • Web Application Security Checklist
    • OWASP Top 10 for LLM Applications
    • LLM AI Security Checklist
    • Security Tools
    • Penetration Testing Tricks
    • Secure Code Explain
    • Vulnerability Explain
    • AWS Cloud Security Checklist
  • My Resume
Contact Us
Read more about the article LLM Agents can Autonomously Hack Websites ?

LLM Agents can Autonomously Hack Websites ?

  • Post author:Piyush Kumawat
  • Post published:February 22, 2024
  • Post category:Default/Hacking/Web Application Security
  • Post comments:0 Comments

Based on the research paper (https://arxiv.org/pdf/2402.06664.pdf), the study delves into the autonomous hacking capabilities of Large Language Models (LLMs), particularly focusing on their proficiency in hacking websites without prior knowledge…

Continue ReadingLLM Agents can Autonomously Hack Websites ?
Read more about the article Top Recon Tools for Bug Bounty Hunters

Top Recon Tools for Bug Bounty Hunters

  • Post author:Piyush Kumawat
  • Post published:November 21, 2023
  • Post category:Bug Bounty/Default/Ethical Hacking/Hacking
  • Post comments:0 Comments

In this blog, we explore top-tier reconnaissance tools that empower bug bounty hunters. From Shodan's IoT device insights to Waymore's web application vulnerability identification, each tool in this arsenal plays…

Continue ReadingTop Recon Tools for Bug Bounty Hunters
Read more about the article All about Ethical Hacking

All about Ethical Hacking

  • Post author:Piyush Kumawat
  • Post published:September 10, 2022
  • Post category:Hacking
  • Post comments:7 Comments

This article seeks to serve as a thorough introduction to Ethical Hacking. Ethical hacking refers to the practice of using computer security tools to test a system's vulnerability to attack.…

Continue ReadingAll about Ethical Hacking
Read more about the article Extract Android Application’s Database

Extract Android Application’s Database

  • Post author:Piyush Kumawat
  • Post published:September 10, 2022
  • Post category:Hacking/Tricks
  • Post comments:1 Comment

This article aims to be a comprehensive guide on how you can extract android application's database. In this article, I will show how you can extract android application's database in…

Continue ReadingExtract Android Application’s Database
Read more about the article Unlock Password Protected RAR Files

Unlock Password Protected RAR Files

  • Post author:Piyush Kumawat
  • Post published:September 10, 2022
  • Post category:Hacking/Tricks
  • Post comments:0 Comments

This article aims to be a comprehensive guide on how you can unlock the password of protected RAR files. In this article, I will show you a simple method for…

Continue ReadingUnlock Password Protected RAR Files
Read more about the article Ngrok – Port Forwarding Without Router

Ngrok – Port Forwarding Without Router

  • Post author:Piyush Kumawat
  • Post published:September 10, 2022
  • Post category:Hacking/Tricks
  • Post comments:0 Comments

Welcome to an all-inclusive tutorial covering the seamless integration and configuration of the ngrok tool within your system. Within these pages, you'll discover a straightforward technique to activate port forwarding…

Continue ReadingNgrok – Port Forwarding Without Router
Read more about the article How To Create Bootable USB Flash Drive

How To Create Bootable USB Flash Drive

  • Post author:Piyush Kumawat
  • Post published:September 10, 2022
  • Post category:Hacking/Tricks
  • Post comments:0 Comments

This article aims to be a comprehensive guide on how you can create bootable USB flash drive using simple commands. In this article, I will show you a method to…

Continue ReadingHow To Create Bootable USB Flash Drive
Read more about the article Root Android – Everything you need to know

Root Android – Everything you need to know

  • Post author:Piyush Kumawat
  • Post published:September 7, 2022
  • Post category:Hacking/Linux
  • Post comments:0 Comments

This article seeks to serve as a thorough introduction to Android Rooting. Everyone uses Android devices, much as in the present. All-new Android phone has an open-source operating system, but…

Continue ReadingRoot Android – Everything you need to know
Donate

Donate

Buy me a Coffee
Donate

Penetration Testing Services - Fiverr

Buy me a Coffee
Image Link

Penetration Testing Services

penetration Testing Services
Image Link

Web Application Security Quiz

Web Application Security Quiz
Image Link

Daily Bug Bounty Writeups - Twitter

Daily Bug Bounty Writeups
Image Link

Download our Latest Android Application

Guide for Penetration Testing
Image Link

Daily Bug Bounty Writeups - Telegram

Daily Bug Bounty Writeups

Author

Piyush
Senior Product Security Engineer

Ethical Hacker || Penetration Tester || Gamer || Blogger || Application Security Engineer

READ ARTICLE
Tweets by bountywriteups
Donate

Donate

Buy me a Coffee

Recent Posts

  • 🛠️ Reconnaissance and Vulnerability Scanning Script🛡️
    🛠️ Reconnaissance and Vulnerability Scanning Script🛡️
    August 14, 2024/
    1 Comment
  • LLM Agents can Autonomously Hack Websites ?
    LLM Agents can Autonomously Hack Websites ?
    February 22, 2024/
    0 Comments
  • $600 Simple MFA Bypass – Graphql
    $600 Simple MFA Bypass – Graphql
    February 19, 2024/
    0 Comments

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
logo name

Learn penetration Testing …

Instagram Twitter Youtube Telegram Linkedin

Useful Links

Blogs
About
Contact

Recent Post

  • 🛠️ Reconnaissance and Vulnerability Scanning Script🛡️
  • LLM Agents can Autonomously Hack Websites ?
  • $600 Simple MFA Bypass - Graphql

Subscribe Now

Don’t miss our future updates! Get Subscribed Today!

Subscription Form

By entering your email, you agree to our terms & Conditions and Privacy policy.

©2023. Security Cipher. All Rights Reserved.

Privacy Policies
Terms & Conditions