Unmasking LOLBins: Living Off the Land BinariesA threat that won’t make you Laugh Out Loud, I promise!Jan 12Jan 12
Browser Fingerprinting : The Open SecretIf you think Incognito Mode on your browser really makes your web footprints untraceable, then you’ve been hoodwinked into believing that…Nov 27, 2024Nov 27, 2024
Creating and Configuring a Honeypot in PentBox on Kali LinuxYou must be familiar with honeypots if you’re already in this field, but if you aren’t, you must know what it is (Not Pooh’s favorite…Nov 10, 2024Nov 10, 2024
OWASP Juice Shop : TryHackMe Room WalkthroughA walkthrough of the popular TryHackMe room — OWASP Juice Shop.Oct 20, 2024Oct 20, 2024
Pickle Rick — A Rick and Morty Themed CTF — TryHackMe WalkthroughA walkthrough of the popular Rick and Morty CTF on TryHackMe where Rick is turned into a pickle and needs the ingredients to become human!Oct 17, 2024Oct 17, 2024
Building a python-based Keylogger that sends logs through mailsBuilt using the pynput package in Python, Google Cloud and Gmail API, this keylogger is easy to learn and build.Oct 16, 2024Oct 16, 2024
Understanding Pickle Data and it’s role in Web PenTestingHey there! I am back with something that I came across a recent CTF that I was working with, and it has an interesting name…..Pickles!Oct 4, 2024Oct 4, 2024
Creating a SIEM Lab using ElasticAgent and Parrot OSA quick guide to build a simple-yet-effective SIEM Lab in your PC.Oct 2, 2024Oct 2, 2024
How Cloudfare is making waves with it’s new encryption waysRead more about Cloudfare’s newest encryption method, where the worlds of cryptography and physics collide.Aug 28, 2024Aug 28, 2024
Extracting a password protected Zip file hidden in an image and a text file out of a nested zip…There’s about a hundred ways on the internet to do this, but this one gets the job done faster than any of them.Aug 4, 2024Aug 4, 2024