Secjuice

NON-PROFIT CYBER GOODNESS

  • Technical
  • OSINT
  • Unusual Journeys
  • HoF
  • Write With Us
  • Hire A Writer
  • About Us
  • Rankings
INFOSEC

Secjuice Squeeze 50

Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.

  • Mike Peterson
    Mike Peterson
  • Sinwindie
    Sinwindie
  • Prasanna
    Prasanna
  • Ross Moore
    Ross Moore
  • Tony Kelly
  • Muhammad Luqman
    Muhammad Luqman
  • Miguel A. Calles MBA
    Miguel A. Calles MBA
3 min read
INFOSEC

How to Tell if a Website is Dangerous

Learn how to use different tools to determine whether a site is dangerous.

  • Search-ish
    Search-ish
5 min read
TECHNICAL

How to Use APIs (explained from scratch)

Learn how to use APIs with Python with no prior knowledge of either.

  • Search-ish
    Search-ish
12 min read
CYBERSEC

Using Many Email Addresses to Reduce Your Cybersecurity Risk

Using different email addresses as a cybersecurity strategy can reduce our risk. But make sure to follow good security hygiene.

  • Miguel A. Calles MBA
    Miguel A. Calles MBA
2 min read
INFOSEC

Secjuice Squeeze Volume 49

Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.

  • Prasanna
    Prasanna
  • Miguel A. Calles MBA
    Miguel A. Calles MBA
  • Sinwindie
    Sinwindie
2 min read
OSINT

OSINT & The Intelligence Cycle Part Five: Dissemination

Legend intelligence analyst Sinwindie returns with Part Five in his series on the OSINT Intelligence Cycle.

  • Sinwindie
    Sinwindie
3 min read
OSINT

OSINT - Scraping Deep Web Databases with Python

Learn how to scrape deep web databases with Python for OSINT investigations.

  • Search-ish
    Search-ish
11 min read
OSINT

HTB Intense Walkthrough

A technical walkthrough guide of the INTENSE challenge at HackTheBox.

  • Andy74
    Andy74
45 min read
INFOSEC

Secjuice Squeeze Volume 48

Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.

  • Secjuice
    Secjuice
  • Prasanna
    Prasanna
  • Muhammad Luqman
    Muhammad Luqman
1 min read
OSINT

OSINT Guide To Bitcoin Investigations

Bitcoin offers a unique opportunity for financial investigation in that an amateur can easily research a given person’s bitcoin usage.

  • Search-ish
    Search-ish
4 min read
TECHNICAL

HTB Unbalanced Walkthrough

A technical walk through of the HackTheBox Unbalanced box.

  • Andy74
    Andy74
28 min read
INFOSEC

A Homage To DNS

Since IT'S ALWAYS DNS, I thought I might as well do a little article about all the funny stuff you can do with DNS.

  • Luca Ziesler
    Luca Ziesler
9 min read
INFOSEC

How To Manage Vulnerabilities

Vulnerability management is the practice of finding, indexing, analyzing, and remediating weakness in systems to improve their security.

  • Secprentice
    Secprentice
7 min read
INFOSEC

Secjuice Squeeze Volume 47

Welcome to the Secjuice Squeeze, a curated selection of security articles and infosec news that you may have missed.

  • Secjuice
    Secjuice
  • Prasanna
    Prasanna
  • Muhammad Luqman
    Muhammad Luqman
  • Thunder-Son
    Thunder-Son
  • Sinwindie
    Sinwindie
  • Miguel A. Calles MBA
    Miguel A. Calles MBA
3 min read
INFOSEC

Secjuice Squeeze Special Edition: Top Hacks of 2020

In this Secjuice Squeeze special edition, we review the top hacks of 2020, because looking back this year was a strong year for the bad guys.

  • Secjuice
    Secjuice
  • Prasanna
    Prasanna
  • Muhammad Luqman
    Muhammad Luqman
  • Thunder-Son
    Thunder-Son
  • Sinwindie
    Sinwindie
  • Miguel A. Calles MBA
    Miguel A. Calles MBA
  • Mike Peterson
    Mike Peterson
3 min read
OSINT

OSINT: Automate Face Comparison With Python and Face++

Learn how to automate the task of face comparison during OSINT investigations with Python and Face++.

  • Search-ish
    Search-ish
8 min read
INFOSEC

How & Why You Should Remove Yourself From Windows Local Admin

Members of the admin club are allowed to do anything on a system, but you do not need to wield these godly powers for everyday browsing.

  • Secprentice
    Secprentice
6 min read
INFOSEC

Six Podcasts You Should Listen To

There's always something going on with cybersecurity and the best way to stay up to date is with a good podcast.

  • Shimon Brathwaite
    Shimon Brathwaite
3 min read
OSINT

OSINT: How To Research & Investigate U.S. Phone Numbers

U.S. phone numbers are unique, compared to other countries, because of the publicly available information affiliated with their registered owners.

  • Search-ish
    Search-ish
14 min read
INFOSEC

Essentialism Applied To Infosec

What would your life be like if all you had was the bare minimum of stuff you need to survive and keep yourself physically and mentally healthy?

  • Luca Ziesler
    Luca Ziesler
9 min read
INFOSEC

Make WordPress Pingback Great Again

DoS Amplification and CDN/Load Balancer/WAF bypass. This article aims to show you how a number of ways you can collect WordPress pingback.

  • theMiddle
    theMiddle
8 min read
OSINT

On The OSINT Trail of Palmali Shipping

Seafarer abandonment is a horrible labor-rights abuse where companies cut loose ships with their crews aboard, often leaving them in dire conditions.

  • Eliza Ader
    Eliza Ader
4 min read
INFOSEC

Netflix Security Tools: Chaos Monkey and Chaos Gorilla

Netflix has a security tool that changed the way businesses test for resilience called chaos monkey and it's successor chaos gorilla.

  • Shimon Brathwaite
    Shimon Brathwaite
4 min read
TECHNICAL

HTB OpenKeys Walkthrough

A technical walkthrough of the HackTheBox OpenKeys CTF.

  • Andy74
    Andy74
9 min read
OSINT

OSINT: Investigating Shipping Companies

Shipping companies can be one of the best kinds of companies to investigate on the Internet because they often include much more public information than regular companies.

  • Search-ish
    Search-ish
7 min read
Secjuice © 2021
Linkedin Facebook Twitter Remote Browser Isolation