CSEC_Cybersecurity – Telegram
CSEC_Cybersecurity
815 subscribers
237 photos
3 videos
8 files
64 links
CSEC_ASTU Cybersecurity Division.
Download Telegram
Channel created
Channel name was changed to «CSEC_cyberSecurity»
Channel photo updated
Forwarded from CSEC ASTU (IRIS)
|CSEC Dev

Skill Sharing |Wednesday Session
Presenter - Mr. Amare Yalew
Date - Wed, 4 May 2022
Time - 4:00PM [10:00 Evening LT]
Venue - CSEC Lab [B508 - R9]

Amare Yalew is a skilled and technically qualified software developer with 4+ years of experience in enterprise-level web development and desktop applications for different financial and public organizations. Strong abilities in analysis, coding, and debugging supported by the ability to rapidly adapt to new technical environments. Skilled at implementing best practices and latest technologies such as JavaScript, Angular, React.js, React Native, Express.js, Node.js, TypeScript, MongoDB, and RESTful Web Services through all phases of software development life cycle.

Join us and increase your confidence in your ability to be successful in your career goals.

Everyone is invited!

#CSEC_ASTU #Dev #SKillSharing
👍1
Forwarded from CSEC ASTU (IRIS)
|Cyber

Follow Official CSEC Cyber Security Channel Here.

#Cyber #CSEC_ASTU #Channel
burpsuite_pro_v2022.2.4.zip
503.6 MB
|Cyber

password = 311138
"Burp Suite Professional is the web security tester's toolkit of choice. Use it to automate repetitive testing tasks - then dig deeper with its expert-designed manual and semi-automated security testing tools. Burp Suite Professional can help you to test for OWASP Top 10 vulnerabilities - as well as the very latest hacking techniques."

portswigger.net/burp/pro

#Cyber #CSEC_ASTU #Channel
👍2
|Cyber

Check #this Out
these are the TOP 100 tools used by Ethical Hacker for many purposes
Especially for BugBounty

#Cyber #CSEC_ASTU #BugBounty
https://www.hackerone.com/ethical-hacker/100-hacking-tools-and-resources
CSEC_Cybersecurity pinned «|Cyber
For #statistics
Q. What have you been working on | What field in cyber Security do you want to work on? #Cyber #CSEC_ASTU #poll
»
|Cyber

Click here to access the slide at NahamCon " By Jason Haddix(@jhaddix) The Bug Hunter's Methodology for Application Analysis and Hacking"

⭐️Contents
{
👉🏻 Mental Hurdles
👉🏻 Pre-Manual Testing and Automation
👉🏻 Content Discovery
👉🏻 Application Analysis
}

⭐️Tools Used
{
💥 Webanalyze
💥 Nuclei
💥 FeroxBuster
💥 Wfuzz
💥 Hakrawler etc.....
}
#Cyber #CSEC_ASTU #WebAppHacking
|Cyber
📖📖📖📖📖📖📖📖📖📖📖📖

The Web Application Hacker's Handbook
"This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using
a web browser to communicate with a web server. We examine a wide variety
of different technologies, such as databases, file systems, and web services, but only in the context in which these are employed by web applications."

#Cyber #CSEC_ASTU #webSecurity