Blog
Cyber security is a dynamic field that is always evolving. Keep up with the latest news, vulnerabilities, threats, and new research by following me on Twitter.
YouTube
Posts
For ages, Facebook has been one of the most renowned websites and social media platforms. Posting personal images ...
Watching youtube videos for hours is one of the most exciting activities. There could be a moment when you cannot ...
Chromebook is becoming popular over the days, and many individuals are now switching to them.
Despite its ...
Progressive Snapshot is a free usage-based insurance scheme that tracks and awards safe driving behavior. Contrary ...
By the word hacking, we immediately envision images of crime, unlawful activity, and threats to our privacy. ...
Do you know that 97 people every hour get victimized by cybercrime? This means every 37 seconds, a cybercrime ...
The Internet is overloaded with antivirus alternatives for people. To secure your computer from malware, you must ...
Hacking is a long-term learning process; you can't learn everything by reading a single book and getting a single ...
Write-ups
Intro
The Kenobi box will cover the following topics:
Enumeration of samba shares
Manipulation of a vulnerable ...
Intro
Skynet machine covers the following topics:
Vulnerable smb server
Squirrelmail brute-forcing with ...
Intro
We'll exploit a common misconfiguration on a widely used automation server (Jenkins) and gain access through ...
Intro
This machine will cover brute-forcing account credentials & handling public exploits. Here's a link to ...
Intro
This write-up will cover manually exploiting an SQLi vulnerability without the use of SQLMap, cracking users ...
Intro
Hello there and welcome to my first ever write-up.
Recently I've been spending a lot of time on TryHackMe; ...
Intro
Hi fellow hackers, although we haven't done much than just covering commands, it's a necessary step before ...
Let me show you some tricks on the Bash or Z shell that will help you with productivity.
You have probably come to ...