About Us
We are a group of techies, nerds, literals, and we do what we think deserves to be done. Literally we handle the internet and all its environs
Structure, Implementation, Activity, Manipulation
Comprehensive structure independent to functional learning, Practicals, methodology learning. Evaluate logs and structure better implementations based on the structure of the activity
Ethical Hackers
Group of learning achievers, basically structuring their manipulation through the bug bounty world.
Vulnerability Check
We evaluate and categorize all manipulations based on the critical level of the bugs, evaluate methodology to use, categorize flags and enumerate our options.
Practicals.
[CTF's, Hackerone activity, blog activities]. Among the various elements of structure we certainly want to achieve within the next few commits
Cyber security zero to expert Learning with us
Learn Threat Hunting
Learn all the threat actor's techniques
Learn Attack and Defense
Involving a full pentest methodology
Understand why we Learn Hacking
We wish to counter cyber crime and making it a hobby
Is it okay to JOIN Cyber security?
The neccessity to be in the god mode is always incomprehensible and yet it surpasses everything in the categorical self. You would want to meet most speakers and interact with a majority of cyber security proffessionals
Join UsWatch the comprehensible talks and practicals.
Practical section, talks from our very own, and sessions hosted by our own gurus.
- Practical sections
- Uguntu meetups.
- Familiarism to Penetration Testing, Digital Forensics. code, bug-bounty, programming and how they all relate.
Magnify Ideas
Factor stability
- Possibilities.
- Enumerate
- Potential
Under dev
Being in the Box
Learn
Factor stability
- Possibilities.
- Enumerate
- Potential
Under dev
Bright-up
Learn
Factor stability
- Possibilities.
- Enumerate
- Potential
Under dev
Connection
Learn
Factor stability
- Possibilities.
- Enumerate
- Potential
Under dev
Applause
Learn
Factor stability
- Possibilities.
- Enumerate
- Potential
Under dev
Note
Learn
Factor stability
- Possibilities.
- Enumerate
- Potential
Under dev
Our Services
We achieve all consequent features based on our daily implementation. We cannot stop yet we are dynamic. Feature working with us
Frequently Asked Questions
The following questions are majorly asked for anyone who is new in the world of bug bounty hunting. The neccessary answers to these questions are provided below.
- Learn the basics of web application security
- Learn the basics of web application hacking
- Learn the basics of Malware Analysis
- Learn the basics of SOC analysis
- Learn the basics of scripting
- Learn the basics of priviledge Escalation
- Learn the basics of CTF methodology
- Learn the basics of Enumeration
- Learn the basics of Linux Systems Administration
- Learn the basics of bug bounty resources
- Learn the basics of web application security
- Learn the basics of web application hacking
- Learn the basics of bug bounty hunting
- Learn the basics of bug bounty platforms
- Learn the basics of bug bounty programs
- Learn the basics of bug bounty reporting
- Learn the basics of bug bounty rewards
- Learn the basics of bug bounty tools
- Learn the basics of bug bounty writeups
- Learn the basics of bug bounty resources
Our Team
We are just techies. Nothing Much
ug_pwn
Soc Analyst | Penetration Testergraypwn
MAL-DEV | Penetration Tester0XNull
Penetration Tester0xJIm
Penetration Testerhualfred
RED TEAMER| Threat IntelligenceXOR
Cyber Security EnthusiastContact Us
We live in the tech shadows of uganda. Most of us stay up in the nyt pwning boxes and ctfs.
Get in touch
We live in the tech shadows in ug.
Location:
uganda [+256]
Email:
th3uguntu@gmail.com
Call:
+256 776101437