Skip to content

iwandanu

In Madya Mangun Karsa

  • Beranda
  • Pajak
  • Seputar TIK
  • Wisdoms
  • Curriculum Vitae
×

Tag: airsoft

Tips Berpergian dengan Airsoftgun

Tips Berpergian dengan Airsoftgun

  • 4 min
  • 2

Akhir bulan April lalu saya dinas ke Jakarta selama beberapa hari, ceritanya saya ditugaskan untuk memperbaharui konten situs organisasi yang memang perlu ditata ulang isinya. Jadi kalau anda berkunjung ke situs instansi saya, anda akan menemui kerapihan konten yang tidak ada sebelumnya […]

  • 18/05/2018
Tagged airsoft, airsoftgun, safety, tips

About Me

Ing Madya Mangun Karsa~

My Socials

Random Posts

Mengenal Opini Akuntan
Jurus Main Affiliate – SEO Track
Virtual Tour dan Augmented Reality
When I’m Forty (part 1)

Quotes Of The Day

Be strong enough to be gentle;

Donate

Partners

Categories

  • Artikel Referensi
  • Ide dan Inspirasi
  • OSINT
  • Pajak
  • Peluang Usaha
  • Personal
  • Seputar TIK
  • Wisdoms

KitPloit

DynastyPersist - A Linux Persistence Tool!
MaccaroniC2 - A PoC Command And Control Framework That Utilizes The Powerful AsyncSSH
Mass-Bruter - Mass Bruteforce Network Protocols

Hakin9

RSS Error: A feed could not be found at `https://hakin9.org/category/news/feed/`. This does not appear to be a valid RSS or Atom feed.

Hacktivity h1

Potential IP revealing using UNC Path in Windows File Picker
SQL Injection in parameter REPORT
Use of unitialized value in crypto_pk_num_bits (src/common/crypto.c:971)
Zip bomb
[rt.torproject.org] No Rate Limitting on Login Form
solving TOR vulnerability, in other to make bruteforce difficult
Report Regarding Security Vulnerability
Multiple Path Transversal Vulnerabilites
Tor Project - Full Path Disclosure
https://get.ooni.torproject.org/

The Hacker News

Okta Discloses Broader Impact Linked to October 2023 Support System Breach
DJVU Ransomware's Latest Variant 'Xaro' Disguised as Cracked Software
GoTitan Botnet Spotted Exploiting Recent Apache ActiveMQ Vulnerability
Zero-Day Alert: Google Chrome Under Active Attack, Exploiting New Vulnerability
Transform Your Data Security Posture – Learn from SoFi's DSPM Success
Design Flaw in Google Workspace Could Let Attackers Gain Unauthorized Access
How Hackers Phish for Your Users' Credentials and Sell Them
Key Cybercriminals Behind Notorious Ransomware Families Arrested in Ukraine
Stop Identity Attacks: Discover the Key to Early Threat Detection
Hackers Can Exploit 'Forced Authentication' to Steal Windows NTLM Tokens

iwandanu

Proudly powered by WordPress | Theme : Voice Blog free WordPress theme : by : Postmagthemes