Many websites have private S3 buckets holding secrets inside. We want them.

Photo by Christian Wiediger on Unsplash

What Is An Amazon S3 Bucket?

The Weakest Link


Something is better than nothing, even if it is less than one wanted.

Photo by Kvalifik on Unsplash

Just the title is enough to get you excited, right? OK, grab your coup of coffee and bare with me on this one.

The Intro

There is a POC video about this, but I Don't know how to post it here.


Money-free make your home more secure just using your pc

Photo by Arno Senoner on Unsplash

Tools you will need for this tutorial

  • A computer with a camera
  • Telegram
  • Python 3
  • Basic python/Opencv2 knowledge

A Computer With A Camera


This method for drowsiness detection is fast, efficient, and easy to implement.

Photo by Kalegin Michail on Unsplash

EAR


A real-life story on how I made an increase of 4150% using free collected money.

Photo by Icons8 Team on Unsplash

Note: This is not a tutorial on how to make money, just my own experience. although, This technique may also work for you.


Not only websites and companies get hacked, A real-life story

Photo by Ludovic Toinel on Unsplash

Disclaimer: This is a person I’m friends with now and surely this is not a tutorial, which is why passages are missing!

Intro

Set-up


The basic reverse engineering concept of a file hidden message.

Photo by ThisisEngineering RAEng on Unsplash

The Back Story


hackers don’t only hack computers for profit or harm others, often this gift can and will be use for personal purposes.

Photo by Cookie the Pom on Unsplash

Why I Use My Skills In Real Life


Learn how to make a secure file-transfer application

Photo by JF Martin on Unsplash

File Transfer


Using NLP and Twitter API we can build a sentiment comparison program.

Photo by Zulmaury Saavedra on Unsplash

How Does The Engine Work?

  1. First, a user will input two keywords, e.g. New York and Rome.
  2. The engine will then download the latest, and in real-time tweets relating to those two keywords using the Twitter API.
  3. Next, it uses the TextBlob library for calculating…

c0d3x27

Top Writer |CyberSecurity| Motorcycle Racer| Bug Hunter |#InfoSec #BugBounty #Gym #Programming #Coder

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store