Skip to content
StrawHat Hackers

StrawHat Hackers

Cybersecurity Focused Blog.

StrawHat Hackers
StrawHat Hackers

Cybersecurity Focused Blog.

  • Home
  • About Us
Blog documentation

Computers | Chapter 4: Rediscovering Myself

hackernika May 31, 2025 No Comments

When it comes to computers, I had access to them from an early age. My uncle, my father’s brother had a computer, and as a kid, I used to play…

Blog documentation

My Fate: A Government Employee or a Doctor? | Chapter 3: Rediscovering Myself

hackernika May 31, 2025 No Comments

My inner mind was always telling me to become rich, become famous, and become the man I truly want to be. But at that time, I wasn’t realizing it clearly,I…

Blog documentation

I will be a youtuber. | Chapter 2: Rediscovering Myself

hackernika May 30, 2025 No Comments

So, let’s talk about the founding of Strawhat Hackers… but if you want to know that story, then there’s no option left for us we have to go back a…

Blog documentation

We Are the Version 1s | Chapter 1

hackernika May 30, 2025 1 Comment

My name is Pranav S V, a.k.a. Nika, and I am planning to document our journey, the story of the Strawhat Hackers. Before starting the story, you need to know…

Blog networking

NAT Protocol | StrawHat Hackers

PRANAV May 23, 2025 1 Comment

Introduction NAT protocol stands for Network Address Translation protocol. It is the protocol that helps us use a single global IP address across our local area network and use it…

Blog cybersecurity Vulnerabilities

Information Disclosure

hackernika April 23, 2025 1 Comment

What is Information Disclosure? Imagine that while scrolling through a website’s source code, you come across the admin username and password that were hardcoded by the developer and forgotten to…

Blog cybersecurity Web Pentesting with OWASP Juice Shop

OWASP Juice Shop | Part 2 – Bully Chatbot

hackernika April 16, 2025 2 Comments

Introduction If you’re new to OWASP Juice Shop, try to follow the tasks in order. If you’re interested, follow our series for more guidance. OWASP Juice Shop is an intentionally…

Blog cybersecurity Web Pentesting with OWASP Juice Shop

OWASP Juice Shop | Part 1 – ScoreBoard Solution

hackernika April 15, 2025 2 Comments

Introduction OWASP Juice Shop is an intentionally vulnerable web application project that can be used by beginners or cybersecurity aspirants to improve their skills in web application penetration testing. It…

Blog cybersecurity

Top 8 Hacking Tools For Beginners

hackernika April 6, 2025 No Comments

Introduction This article is mainly written for beginners stepping into the world of cybersecurity. When you start your journey, you’ll come across a flood of hacking tools and it’s totally…

Blog Bug Hunting cybersecurity

Whatsapp Bug Report

PRANAV March 15, 2025 No Comments

Disclaimer: This article is for educational and legal purposes only. We do not promote or support any illegal activities Yes, You head it right, the title is not a clickbait.…

Posts pagination

1 2

Next Page »

You Missed

Blog documentation

Computers | Chapter 4: Rediscovering Myself

Blog documentation

My Fate: A Government Employee or a Doctor? | Chapter 3: Rediscovering Myself

Blog documentation

I will be a youtuber. | Chapter 2: Rediscovering Myself

Blog documentation

We Are the Version 1s | Chapter 1

StrawHat Hackers

StrawHat Hackers

Cybersecurity Focused Blog.

Copyright © All rights reserved | Blogus by Themeansar.