Takeaways from the Bike HackTheBox MachineNoting down my learning from the Bike Lab. Each section has different concepts I learned.2d ago2d ago
How Threat Actors Exploit Brand TrustThreat actors often use low-cost cloud and hosting services, such as Google Drive, Google Sites, GitHub pages, Trello, OneDrive, Dropbox…2d ago2d ago
Published inInfoSec Write-upsPowerShell: Ignite Your Digital Domain with Command-Line Brilliance !Getting started with PowerShell profiles.Jun 9, 2023Jun 9, 2023
Published inInfoSec Write-upsUnleashing the Tengyun Snake Trojan: The Stealthy Threat Lurking in Your System 😲Envision waking up one day to discover that your organization’s entire infrastructure has been compromised and your most sensitive…Mar 2, 2023Mar 2, 2023
Published inInfoSec Write-upsElementary static malware analysis approachesMalware is the most serious concern to all organizations or individuals that can cause significant threats to server, host system, or…Dec 29, 20221Dec 29, 20221
Autopsy (GUI) in LinuxHello world. This is a short writeup of Autopsy(GUI) in Kali workstationNov 25, 2022Nov 25, 2022
Recovering clipboard content and plaintext password recovery through volatilityWell, hello guys. I am back after a long time . Today I am here to share you about a little on volatility tool which includes recovering…Sep 27, 20212Sep 27, 20212
Published inInfoSec Write-upsExternal SSRF detected ⚠️Holaaaaa hackers !! Hope you all are doing well. Welcome back again … 👋Jul 13, 20218Jul 13, 20218
Published inInfoSec Write-upsAPPLICATION SECURED ? LET’S CHECK IT WITH SQL INJECTIONS 😈~# Table of Content :Jul 7, 20212Jul 7, 20212