cybrr_warrior_officialCONTI RANSOMWARE GANG: Motives and Methods Part: 1Ransomeware is malware that blocks access to the device until the victim pays a ransom specified by the malware operator. Attackers…6 min read·Dec 25, 2022----
cybrr_warrior_officialRaspberry Pi’s for Wi-Fi HackingHey folks this is cybrr_warrior_official. You can follow me on Instagram with the same username or by clicking on the username appeared…7 min read·Jul 8, 2021----
cybrr_warrior_officialAnonymous calls without a SIM cardPerhaps you have had situations when you had to call a person and at the same time remain completely anonymous and not burn your number…1 min read·Jul 7, 2021----
cybrr_warrior_officialINFLUENCE ZONE EXTENSION AND PRIVILEGE ESCALATIONPhase I6 min read·Nov 4, 2020----
cybrr_warrior_officialWhat is the Importance of Reconnaissance in Bug Bounty/Penetration testing? Part-1Hey folks!10 min read·Aug 23, 2020----
cybrr_warrior_officialHow I made $2000 with URL REDIRECTION?Hi this is Simran Singh (cybrr_warrior_official). This is my first bug bounty write-up. And in this article I’m going to tell you how I got…2 min read·Aug 12, 2020--1--1