• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Craig Hays

  • About
  • Articles
  • Newsletter
  • Contact
  • Show Search
Hide Search
You are here: Home / Articles

Articles

Cybersecurity Principles

Vulnerability Scanning vs Penetration Testing: Why Both are Important

Cybersecurity Transformation

Cybersecurity Transformation Roadmap Checklist

Cybersecurity Skills

9 Things I’ve Learned Writing Phishing Emails

Cybersecurity Tutorials

BeyondTrust Privileged Remote Access – Ultimate Deployment Guide

Nmap OS Detection: Easy, Fast, and Powerful Examples [How To Guide]

Microsoft LAPS: Setup, Install, Use, And Secure With Multi-Factor Authentication

Dynamically create a phishing page based on the HTTP referer header

Enforcing better Active Directory passwords (Password audit part 3)

Cracking Active Directory passwords (Password audit part 2)

Brute force attack your own users (Password audit part 1)

Bug Bounty Hunting

How I Bought a £240.00 Annual Subscription for Bargain £0.01

Pre-Account Takeover by Reversing a Weak Email Verification Token Algorithm

Cracking Encrypted Credit Card Numbers Exposed By API

One Time Code Bypass With An Inverted Brute-Force Attack

Bug Bounty Hunting Tips #6 — Simplify

Bug Bounty Hunting Tips #5 — Aim to Become World-Class in Your Niche

Bug Bounty Tips #4, Covid-19 phishing, and more

Bug Bounty Hunting Tips #3 — Kicking S3 Buckets

Bug Bounty Hunting Tips #2 —Target their mobile apps (Android Edition)

Bug Bounty Hunting Tips #1— Always Read the Source Code

Primary Sidebar

Newsletter

Want to get smarter about cyber security? Join my growing list of newsletter readers for exclusive news, reviews, how-tos, and more.

Craig Hays

© Craig Hays, 2006–2025

  • All Articles