How to Submit an Article to Deep Hacking
Learn how to propose and submit articles to Deep Hacking, from proposal approval to the Pull Request, with a Markdown format guide and author page instructions.
7 articles
Learn how to propose and submit articles to Deep Hacking, from proposal approval to the Pull Request, with a Markdown format guide and author page instructions.
Discover the evolution of Deep Hacking from its beginnings in 2021 to becoming an international community platform. Learn about the changes, improvements and the new version built with Astro.
Oh My Pentest Report is a custom theme for Oh My Zsh designed for pentesters: automatic command logging, dynamic IP display, date/time, and Git support.
Discover CAI, the open-source AI framework for automated pentesting: real results on HTB, PortSwigger, and bug bounties, revolutionary offensive and defensive capabilities.
Discover what RFID technology is, how low and high frequency tags work, their applications in access control, contactless payments, and how to identify the frequency of RFID tags.
Real experiences from cybersecurity professionals about how they got their first jobs: advice, lessons learned, and pathways to enter the sector.
Learn how to perform Rogue AP attacks against WPA Enterprise networks using hostapd-wpe to capture user credentials.
If you like the content and want to support the project, you can buy me a coffee. Your support helps keep the site active and create more quality content.
Buy me a coffeeThanks for your support 🙏