Explore essential concepts, practices, and notes on ethical hacking and cybersecurity. This section covers key security principles, types of vulnerabilities and attacks, penetration testing methodologies, defensive strategies, and the importance of maintaining security awareness throughout the software development lifecycle.
arrow_back
Dorokhov.codes
security
Security
4 articles
Ethical hacking
article
Contents
(4)
01
SMS verification services: virtual numbers and receiving codes
1 min
chevron_right
02
Privacy-oriented payments: virtual cards and third-party services
1 min
chevron_right
03
Android RAT malware: remote access trojans and awareness
1 min
chevron_right
04
Phishing and MITM: evilginx2, session cookies, and 2FA risks
1 min
chevron_right