Shreya TalukdarinInfoSec Write-upsPowerShell: Ignite Your Digital Domain with Command-Line Brilliance !Getting started with PowerShell profiles.Jun 9, 2023Jun 9, 2023
Shreya TalukdarinInfoSec Write-upsUnleashing the Tengyun Snake Trojan: The Stealthy Threat Lurking in Your System 😲Envision waking up one day to discover that your organization’s entire infrastructure has been compromised and your most sensitive…Mar 2, 2023Mar 2, 2023
Shreya TalukdarinInfoSec Write-upsElementary static malware analysis approachesMalware is the most serious concern to all organizations or individuals that can cause significant threats to server, host system, or…Dec 29, 20221Dec 29, 20221
Shreya TalukdarAutopsy (GUI) in LinuxHello world. This is a short writeup of Autopsy(GUI) in Kali workstationNov 25, 2022Nov 25, 2022
Shreya TalukdarRecovering clipboard content and plaintext password recovery through volatilityWell, hello guys. I am back after a long time . Today I am here to share you about a little on volatility tool which includes recovering…Sep 27, 20212Sep 27, 20212
Shreya TalukdarinInfoSec Write-upsExternal SSRF detected ⚠️Holaaaaa hackers !! Hope you all are doing well. Welcome back again … 👋Jul 13, 20218Jul 13, 20218
Shreya TalukdarinInfoSec Write-upsAPPLICATION SECURED ? LET’S CHECK IT WITH SQL INJECTIONS 😈~# Table of Content :Jul 7, 20212Jul 7, 20212
Shreya TalukdarinInfoSec Write-upsReflected xss triggered in URL 🔎Let’s dig in together…Jul 6, 20214Jul 6, 20214
Shreya TalukdarinInfoSec Write-upsSunset-Midnight-Ctf-Walkthrough 🌄Today we are going to solve another boot2root challenge called “Sunset: Midnight”. It’s available at VulnHub for penetration testing. Here…Jul 4, 20211Jul 4, 20211