Search:

Type: Posts; User: CrySys

Search: Search took 0.00 seconds.

  1. Replies
    3
    Views
    15,222

    A token of gratitude

    Thank you so much, Mr. b0nd. Your reply was very helpful :)
  2. Replies
    1
    Views
    9,977

    Here's my version

    Step 1: Identify the target and it's flaws. There are always flaws. This step requires a lot of arbitrary inputs providing.
    Step 2: Find the right exploit. Once you find the vulnerabilities, it's...
  3. Replies
    1
    Views
    9,977

    Steps in hacking an application

    Hi,
    Feels great to be a part of this awesome website.
    I'm a beginner, so, please bear with me.
    I am a high school student, a coder and a hacker.
    I have been hacking the web applications I make...
  4. Replies
    3
    Views
    17,586

    I am interested. If it's ethical. And I need to...

    I am interested. If it's ethical. And I need to know how it's ethical.
  5. Replies
    3
    Views
    15,222

    Here's my version

    Step 1: Identify the target and it's flaws. There are always flaws. This step requires a lot of arbitrary inputs providing.
    Step 2: Find the right exploit. Once you find the vulnerabilities, it's...
  6. Replies
    3
    Views
    19,383

    Look man, there's no "tutorials" whuch can get...

    Look man, there's no "tutorials" whuch can get you into hacking. You need to be a coder first.

    Then, hack whatever you make. This way, you'll learn from your own security flaws. From your own...
  7. Replies
    3
    Views
    15,222

    Steps in hacking an application

    Hi,
    Feels great to be a part of this awesome website.
    I'm a beginner, so, please bear with me.
    I am a high school student, a coder and a hacker.
    I have been hacking the web applications I make...
Results 1 to 7 of 7