Yes, of course! But they have to be related to the topic of ethical hacking, penetration testing or any other topic in a broader scope of cybersecurity, bring value to our readers, and not be published anywhere else.
Author

Yes, of course! But they have to be related to the topic of ethical hacking, penetration testing or any other topic in a broader scope of cybersecurity, bring value to our readers, and not be published anywhere else.