Th3 Uguntu

About Us

We are a group of techies, nerds, literals, and we do what we think deserves to be done. Literally we handle the internet and all its environs

Structure, Implementation, Activity, Manipulation

Comprehensive structure independent to functional learning, Practicals, methodology learning. Evaluate logs and structure better implementations based on the structure of the activity

Ethical Hackers

Group of learning achievers, basically structuring their manipulation through the bug bounty world.

Vulnerability Check

We evaluate and categorize all manipulations based on the critical level of the bugs, evaluate methodology to use, categorize flags and enumerate our options.

Practicals.

[CTF's, Hackerone activity, blog activities]. Among the various elements of structure we certainly want to achieve within the next few commits

Cyber security zero to expert Learning with us

Learn Threat Hunting

Learn all the threat actor's techniques

Learn Attack and Defense

Involving a full pentest methodology

Understand why we Learn Hacking

We wish to counter cyber crime and making it a hobby

Is it okay to JOIN Cyber security?

The neccessity to be in the god mode is always incomprehensible and yet it surpasses everything in the categorical self. You would want to meet most speakers and interact with a majority of cyber security proffessionals

Join Us

Watch the comprehensible talks and practicals.

Practical section, talks from our very own, and sessions hosted by our own gurus.

  • Practical sections
  • Uguntu meetups.
  • Familiarism to Penetration Testing, Digital Forensics. code, bug-bounty, programming and how they all relate.
Join Us

Magnify Ideas

Factor stability

  • Possibilities.
  • Enumerate
  • Potential

Under dev

Being in the Box

Learn

Factor stability

  • Possibilities.
  • Enumerate
  • Potential

Under dev

Bright-up

Learn

Factor stability

  • Possibilities.
  • Enumerate
  • Potential

Under dev

Connection

Learn

Factor stability

  • Possibilities.
  • Enumerate
  • Potential

Under dev

Applause

Learn

Factor stability

  • Possibilities.
  • Enumerate
  • Potential

Under dev

Note

Learn

Factor stability

  • Possibilities.
  • Enumerate
  • Potential

Under dev

Our Services

We achieve all consequent features based on our daily implementation. We cannot stop yet we are dynamic. Feature working with us

CTF development

Table Top Exercises | cyber drills | CTF as a Service

Digital Forensics

Managed SOC | IR | Threat Huntimg

Penetration Testing | VAPT

Mobile | Web | Network

Frequently Asked Questions

The following questions are majorly asked for anyone who is new in the world of bug bounty hunting. The neccessary answers to these questions are provided below.

To start bug bounty, you just need to begin. Dont be heart fainted. Just start with the basics. You can start with the following steps:
  • Learn the basics of web application security
  • Learn the basics of web application hacking
  • Learn the basics of Malware Analysis
  • Learn the basics of SOC analysis
  • Learn the basics of scripting
  • Learn the basics of priviledge Escalation
  • Learn the basics of CTF methodology
  • Learn the basics of Enumeration
  • Learn the basics of Linux Systems Administration
  • Learn the basics of bug bounty resources

Bug bounty is a program in which companies offer rewards to security researchers for finding and reporting vulnerabilities in their systems. The rewards are usually paid in cash or in the form of gift cards.

A vulnerability is a weakness in a system that can be exploited by an attacker to gain unauthorized access to the system. Vulnerabilities can be found in software, hardware, or firmware. Vulnerabilities can be found in the following:

Finding vulnerabilities is not an easy task. It requires a lot of practice and patience. You can find vulnerabilities by following the following steps:
  • Learn the basics of web application security
  • Learn the basics of web application hacking
  • Learn the basics of bug bounty hunting
  • Learn the basics of bug bounty platforms
  • Learn the basics of bug bounty programs
  • Learn the basics of bug bounty reporting
  • Learn the basics of bug bounty rewards
  • Learn the basics of bug bounty tools
  • Learn the basics of bug bounty writeups
  • Learn the basics of bug bounty resources
 

Our Team

We are just techies. Nothing Much

ug_pwn

Soc Analyst | Penetration Tester

graypwn

MAL-DEV | Penetration Tester

0XNull

Penetration Tester

0xJIm

Penetration Tester

hualfred

RED TEAMER| Threat Intelligence

XOR

Cyber Security Enthusiast

Contact Us

We live in the tech shadows of uganda. Most of us stay up in the nyt pwning boxes and ctfs.

Get in touch

We live in the tech shadows in ug.

Location:

uganda [+256]

Email:

th3uguntu@gmail.com

Call:

+256 776101437