Published inInfoSec Write-upsThe Role of Telegram in the Modern Cybercrime EconomyTelegram, once a messaging app celebrated for its encryption and user-friendly features, has inadvertently become a hub for cybercriminal…Nov 27Nov 27
Takeaways from the Bike HackTheBox MachineNoting down my learning from the Bike Lab. Each section has different concepts I learned.Nov 11Nov 11
How Threat Actors Exploit Brand TrustThreat actors often use low-cost cloud and hosting services, such as Google Drive, Google Sites, GitHub pages, Trello, OneDrive, Dropbox…Nov 11Nov 11
Published inInfoSec Write-upsPowerShell: Ignite Your Digital Domain with Command-Line Brilliance !Getting started with PowerShell profiles.Jun 9, 2023Jun 9, 2023
Published inInfoSec Write-upsUnleashing the Tengyun Snake Trojan: The Stealthy Threat Lurking in Your System 😲Envision waking up one day to discover that your organization’s entire infrastructure has been compromised and your most sensitive…Mar 2, 2023Mar 2, 2023
Published inInfoSec Write-upsElementary static malware analysis approachesMalware is the most serious concern to all organizations or individuals that can cause significant threats to server, host system, or…Dec 29, 20221Dec 29, 20221
Autopsy (GUI) in LinuxHello world. This is a short writeup of Autopsy(GUI) in Kali workstationNov 25, 2022Nov 25, 2022
Recovering clipboard content and plaintext password recovery through volatilityWell, hello guys. I am back after a long time . Today I am here to share you about a little on volatility tool which includes recovering…Sep 27, 20212Sep 27, 20212
Published inInfoSec Write-upsExternal SSRF detected ⚠️Holaaaaa hackers !! Hope you all are doing well. Welcome back again … 👋Jul 13, 20218Jul 13, 20218