Is a public static cloud file storage resource available in Amazon Web Services’ (AWS) Simple Storage Service (S3), an object storage offering. S3 buckets, are similar to file folders, store objects, which consist of data and its descriptive metadata.
Amazon S3 uses the same scalable storage infrastructure that Amazon.com uses to run its global e-commerce network. It can be employed to store any type of object, which allow users storage for Internet applications, backup and recovery, disaster recovery, data archives, data lakes for analytics, and hybrid cloud storage.
Just the title is enough to get you excited, right? OK, grab your coup of coffee and bare with me on this one.
A couple of days ago while testing a website for bugs, I had Instagram open in one of my tabs. At some point, that tab sent some data to its servers, and my proxy intercepted it, bringing to my attention a better target with higher bounty opportunities.
There is a POC video about this, but I Don't know how to post it here.
After hours of trying to find some weakness, I gave up. Just there, I…
How many times you are not around your computer, and there is always someone trying to use it? Do you have a sibling who can’t just mind his business? Well, using Python and Opencv2, we can make an app that will use your computer to detect anything moving around it and will send you a telegram notification whenever it detects any movement. The app can also be used as some kind of home security app for your whole house.
Unlike cellphones, computers don’t have movement sensors. Therefore we can’t…
W e are going to build a computer vision application that is capable of detecting drowsiness in video streams using facial landmarks with OpenCV, Python, and dlib. To build this detector, we’ll be using the eye aspect ratio (EAR), introduced by Soukupová and Čech.
Keeping it short and simple, the eye aspect ratio is an elegant solution that involves a very simple calculation based on the ratio of distances between facial landmarks of the eyes.
Nowadays, as soon as you enter the internet, you are met with a ton of information, Telling you how to become rich or make money while on the internet. Isn’t as easy as it sounds, often you will be just wasting your time reading or watching stuff about it.
Note: This is not a tutorial on how to make money, just my own experience. although, This technique may also work for you.
Disclaimer: This is a person I’m friends with now and surely this is not a tutorial, which is why passages are missing!
For some weird reason, I thought my neighbor was a secret service agent, CIA, or something similar. The way he move, talk and behave just gave me that feeling. One night after seeing him go to his garage and staying there for hours, I knew something strange was going on. I need evidence to back up my claims, and the only thing that came to my mind was to get into his home network.
I have been doing Bug Bounty for a couple of years now, as you may know, most of the people working in this field tend to share many similarities. The type of movies they watch, programs to work with, and even the same group of YouTubers to get information and learn more skills from.
But the thing most or just all Bug Hunters have in common are CTFs. I kind of knew what was it but never had a real interest in it just until today. Yes, today was my first time playing CTF. Somehow Youtube sent my way a…
The first thing I learned about Cybersecurity is to think differently, to think out of the box. Thinking like everyone else will mean getting the same results others are getting. In Bug Bounties using this concept will always reward you with fantastic findings, and decent rewards. Thinking and doing whatever others are doing will just give as a result, duplicates. Every problem is unique and it should be treated as such.
Life is hard at it is. If you add bad friendships, family, love problems. It gets worst. I consider myself new to the hacking world, but even like that…
One of the biggest problems I find with any commercial app is you never know who’s accessing your personal information. Anything shared among people on the internet will always be subject to attacks, like those of MITM.
Chat, photo, and file-transfer applications, only to name a few, are the most popular criminal targets. If you’re like me, meaning being skeptical when using free stuff, you’ll always try to find a better way around. Today, we’ll make our own simple file-transfer program using Python.
A file transfer is the copying or moving of a file from one computer to another over…
How many times do you discuss which phone is better — Apple or Android? Ferrari or Lamborghini? We can build an engine that will give us the “correct” answers to these questions, using live feedback from people all around the world. This engine collects live tweets from random users around the globe, analyzes them, and gives you back the results.
Top Writer |CyberSecurity| Motorcycle Racer| Bug Hunter |#InfoSec #BugBounty #Gym #Programming #Coder