PinnedMartianinMartian Defense CybersecurityBug Bounty for Beginners (Part 1): Utilizing OWASP to get into BBPsThis article will cover the essentials to get started with bug bounty hunting. There are many organizations with a need to have their…12 min read·Mar 3, 2023--2--2
PinnedMartianinSystem WeaknessThe Application Penetration Testing Process: A checklist for every engagementThis article delivers an overview of application penetration tests and can be utilized as a static reference to stay on track during…4 min read·Dec 11, 2022----
PinnedMartianinSystem WeaknesseWPT to eWPTX Certified in 45 days (without INE labs) — Exam Review and TipsIn this article, I am going to provide feedback and helpful tips for the eWPT and eWPTXv2 exams.7 min read·Sep 25, 2022----
PinnedMartianinSystem WeaknessDeploy vulnerable web applications for Application Security (AppSec) training in under 25 minutesAfter successfully installing Kali Linux, use this article as reference to get started with Web Application Security Testing for free. The…4 min read·Aug 10, 2022----
MartianinInfoSec Write-upsMobile App Pentesting: AndroGOAT Assessment WalkthroughHave you ever wondered about the vulnerabilities hidden beneath the surface of your favorite mobile apps? I certainly did, which is why I…12 min read·Jul 4, 2023--1--1
MartianinMartian Defense CybersecurityUnveiling Trickest: My Secret Weapon for Automating the Bug Bounty HuntOverview8 min read·Jun 13, 2023----
MartianinMartian Defense CybersecurityOutlining the Vulnerability Assessment ReportA Vulnerability Assessment report is a documented form of assessment findings. It also includes advice on how to fix any security flaws…7 min read·Jun 3, 2023----
MartianinMartian Defense CybersecurityOutlining the Penetration Test ReportA penetration testing report is an in-depth description of the vulnerabilities, faults, and flaws found during the security assessment. It…8 min read·Jun 3, 2023----
MartianinMartian Defense CybersecurityCybersecurity Risks of 5G connectivity on IoT devicesIntroduction5 min read·Apr 13, 2023----
MartianinMartian Defense CybersecurityBug Bounty for Beginners (Part 3): Understanding The Reporting ProcessThis article in the series contains a look into effective reporting for organizations and researchers in Bug Bounty Programs (BBPs). The…7 min read·Mar 3, 2023----