Heyo snowpackers β Yeti here, fresh off the slopes and armed with a fuzz cannon.
Today, weβre smashing down snow-covered doors in the world of directory busting β one of the oldest recon tactics
Hey everyone β Yeti is back with another snowball of wisdom.
Today weβre diving into one of the oldest (but still dangerously effective) attack methods in the web hacking playbook: brute forcing. And
Hey everyone, itβs Yeti back again, and lately Iβve been sharpening my claws on some bug bounty practice β diving into one of the best playgrounds for web app security: OWASP Juice
Hey everyone, 404Yeti here!
Today Iβm walking you through one of my biggest setups yet β building a custom Jenkins CI/CD environment using Docker, Go, and pipelines with agents.
This guide covers:
Hey everyone β 404Yeti here, back from the Icebox βοΈ
Today I want to share a project I built called RedFlag, a purposely vulnerable web app thatβs small in size but massive in security