Hello cyberman! Time flies, doesn’t it? I wanted to create this document about AI models and their uses, which have been trending lately. I also […]
Gods and Titans of the Tech
The foundations of the internet were laid in the 1960s. ARPANET (Advanced Research Projects Agency Network), funded by the US Department of Defense, is considered […]
Why Are Hackers Interested in Me?
I know. Being on the writing side again after a long break feels strange for the reader as well. A few people I don’t know […]
What Is Email Injection? And What Can Be Done?
Hello Cyberman! How are you? I hope you fine. This article subject email injection. I a lot of see it in bug bounty program. And […]
What Is LDAP And How To Hacking With LDAP?
Hello cyberman!This article subject LDAP and hacking with LDAP. First of all, we need to know what LDAP is. The definition LDAP in Wikipeadia: The […]
Vulnhub: Earth – CTF
Hello Cyberman! How are you? I hope you are fine. This article subject name as earth in vulnhub machine list. Yes, this ctf wonderful. Because […]
İnternet Ve Özgür Gezinti
Merhaba Siber Adam! Biliyorum, uzun bir aradan sonra Türkçe yazmam seni meraklandırmış olmalı. Sebebini merak ediyorsan sana şu kadar söyleyeyim: S4M Manifestosu budur işte! Zamanla […]
Vulnhub: Quoaor – CTF
Hello Cyberman! This article subject CTF (Capture The Flag). This vulnerability machine is name “Quoaor”. And this CTF is level 1. This machine as Ubuntu. […]
Vulnhub: DC-7 – CTF
Hello Cyberman! This article subject CTF (Capture The Flag). This vulnerability machine is name “DC-7”. And this ctf is level 1. This machine has Debian. […]
Javascript Cannot Block It – 2
Hello Cyberman! This article subject licence software with Javascript safety.There a program. And its name Mobirise. Really, wonderful program. This program website template create. And […]

Breaking News
What is Prompt Injection? The Most Dangerous Vulnerability in Artificial Intelligence Systems.
Gods and Titans of the Tech
Why Are Hackers Interested in Me?
What Is Email Injection? And What Can Be Done?
What Is LDAP And How To Hacking With LDAP?