Hey everyone — Yeti is back with another snowball of wisdom.
Today we’re diving into one of the oldest (but still dangerously effective) attack methods in the web hacking playbook: brute forcing. And
Hey everyone, it’s Yeti back again, and lately I’ve been sharpening my claws on some bug bounty practice — diving into one of the best playgrounds for web app security: OWASP Juice
Hey everyone, 404Yeti here!
Today I’m walking you through one of my biggest setups yet — building a custom Jenkins CI/CD environment using Docker, Go, and pipelines with agents.
This guide covers:
Hey everyone — 404Yeti here, back from the Icebox ❄️
Today I want to share a project I built called RedFlag, a purposely vulnerable web app that’s small in size but massive in security
Hey everyone, Yeti here 🐾
As part of my journey into deeper AppSec, I wanted to build something that combines everything I’ve been learning: APIs, real-time backend behavior, front-end vulns, and secure(ish)