Cyber Security Community
Dark Clown Security adalah komunitas yang aktif membahas hal-hal yang berkaitan dengan dunia IT.
- Network Security
- Penetration Tester
- Cyber Security Analysis



Congratulations
Your admission completed
About us

Apa itu Dark Clown Security ?
Dark Clown Security berdiri pada juli 2019 sebagai komunitas keamanan siber yang berpacu kepada keamanan web / web security , dan kami sekarang sudah menemukan celah keamanan lebih dari 500+ website perusahaan , pemerintah , universitas , dll.
- Profesional Penetration Tester
- Cyber Security Analysis
- Network Security
- Web Developer
Profesional Penetration Tester
Cyber Security Analysis
Network Security
Web Developer
0
Penetration Tester
0
Cyber Security Analysis
0
Network Security
0
Web Developer
Most Popular Courses
Blog
My first Critical on hackerone with a $6,400 bounty — SQL Injection
Hello everyone, introduce my name is Tengku Arya Saputra(Follow my Linkedin) on this occasion I will tell you how I found a security hole with a very critical vulnerability level on one of the bug bounty platforms HackerOne..
- 5.0/5.0

[IDOR] $400 Deleting Other Project in Shopee
Hello everyone, introducing my name Tengku Arya Saputra (Follow my Linkedin) previously I have discussed about my discovery with a very critical vulnerability level with a bounty $6,400, on this occasion I will try to share my discovery on the shopee subdomain.
- 4.0/5.0

Bug Bounty Writeup $$$ || Parameter Tampering
This parameter tampering can be said to be a method of manipulating the parameters that will be sent to the server to modify the data to be sent..
- 4.0/5.0
XSS Stored WriteUp- Cross Site Scripting in K*******.id
Introduce my name is Tengku Arya Saptra. Here I found a security vulnerability, namely XSS on the k*******.id website (I can’t say the domain because of privacy) this website is related to online learning..
- 4.0/5.0

Dynmx - Signature-based Detection Of Malware Features Based On Windows API Call Sequences
dynmx (spoken dynamics) is a signature-based detection approach for behavioural malware features based on Windows API call sequences. In a simplified way, you can think of dynmx as a sort of YARA for API call traces (so called function logs) originating from.
- 4.5/5.0

Sekiryu - Comprehensive Toolkit For Ghidra Headless
This Ghidra Toolkit is a comprehensive suite of tools designed to streamline and automate various tasks associated with running Ghidra in Headless mode.
- 4.5/5.0
Callisto - An Intelligent Binary Vulnerability Analysis Tool
Callisto is an intelligent automated binary vulnerability analysis tool. Its purpose is to autonomously decompile a provided binary and iterate through the psuedo code output looking for potential security vulnerabilities in that pseudo c code.
- 4.0/5.0

SMShell - Send Commands And Receive Responses Over SMS From Mobile Broadband Capable Computers
PoC for an SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers. This tool came as an insipiration during a research on eSIM security implications led by Markus Vervier, presented at Offensivecon 2023.
- 5.0/5.0
ADCSKiller - An ADCS Exploitation Automation Tool Weaponizing Certipy And Coercer
ADCSKiller is a Python-based tool designed to automate the process of discovering and exploiting Active Directory Certificate Services (ADCS) vulnerabilities.
- 4.5/5.0

NucleiFuzzer - Powerful Automation Tool For Detecting XSS, SQLi, SSRF, Open-Redirect, Etc.. Vulnerabilities In Web Applications
NucleiFuzzer is an automation tool that combines ParamSpider and Nuclei to enhance web application security testing. It uses ParamSpider to identify potential entry points and Nuclei's templates to scan for vulnerabilities.
- 4.0/5.0
E-Learning Cyber Security!
Disini anda akan belajar mengenai cyber seurity dan terdapat banyak modul modul tentang keamanan pada aplikasi.
Our Trending Courses
Check out most 🔥 courses in the market