• |Home
  • |About
  • |Advisor
  • |CTF
    Dashboard Weekly CTFs Monthly CTFs Writeups
  • |Events
  • |Gallery
  • |Groups
  • |Resources
  • |Sponsors
  • | Article
    News Highlights Blog
  • |Certificate
  • |Membership
    Membership Process Join Us
  • | More
    Store CSC - logo & using guidelines

Featured Blogs

Hand-picked articles from our expert contributors

CTF Writeup
Tutorial
20 min read
Seam Sikder Nahid October 31, 2025

Nmap for Hackers

Nmap (Network Mapper) is a powerful open-source tool used for network discovery and security auditing. In this article, we will explore how hackers utilize Nmap to gather information about target systems, identify open ports, and detect vulnerabilities.

Nmap Network Kali Linux
Read Full Article
CTF Writeup
Tutorial
10 min read
Seam Sikder Nahid October 11, 2025

15 Essential Linux Commands for Hackers

Linux is the playground for hackers, sysadmins, and CTF warriors. These commands aren’t just tools—they’re your language for navigating systems, automating tasks, and investigating digital trails. Each one builds muscle memory and confidence.

Linux Fundamentals Kali Linux
Read Full Article
Web Application Security
Tutorial
15 min read
Pranto Kumar Shil August 5, 2025

Complete Guide to OWASP Top 10 Vulnerabilities

A comprehensive walkthrough of the OWASP Top 10 web application security risks with practical examples, exploitation techniques, and mitigation strategies for each vulnerability.

Web Security OWASP Penetration Testing
Read Full Article

Cyber Security Club, Uttara University

Contact@CyberSecurityClub
©2025 | All rights reserved by Cyber Security Club, Uttara University
Thanks to our awesome contributors