Archive of previous live webinars about a wide range of cybersecurity topics: from pentesting to compliance and conference talks
Learn how to build your own AI Hacking agent using MCP x LLM x KALI. And then how to hack MCP agents
Custom-made collections of API fuzzing lists scraped from 120,000+ public documentations: ports, paths, parameters and many more
"You are sharing gold tips! Thanks for the contribution"
Security Specialist @Microsoft
"I’m an appsec guy and I’m also building an app. Your post helped me to see a weakness in my API which is now fixed"
App Sec Consultant @Veracode
"This was great, and I just received a 200$ bounty out of this"
Bug Hunter @Hacker1
"This is great work. There are a lot of JWT home-made solutions, making this even more valuable. Good stuff!"
CEO @ Cyber Crucible
"Super relevant. Evil always hides in the shadows. Better to bring some light and document your systems"
Founder @Security Scientist
"Nice one! Did not know that underscores can be used as wildcards! I really appreciate your tips and tricks threads!"
Security Consultant @Zacco