Explore the latest articles and insights from our team
This course is designed to be hands-on and beginner-friendly, so even if you’re new to the world of network security, you’ll be able to follow along with ease. By the end, you'll have a
Read MoreToday we’re going to see how real malware protect themselves from being analyzed using a technique called Api Hashing. First of all we should...
Read MoreToday we’ll dump LSASS.EXE process memory to obtain credentials and we also will be using some evasion techniques. During red team...
Read MoreToday we’re gonna see an effective technique to mantain access in Windows systems during red team operations just by modifying a registry key...
Read MoreToday we’ll learn an advanced shellcode injection technique used by Lazarus group which uses UuidFromStringA API call. In this technique, the malware..
Read MoreInstahack is a security tool officially designed to test the password strength of Instagram accounts using termux and kali with a brute force attack...
Read MoreToday we’re gonna see a simple malware development technique, Shellcode injection via CreateRemoteThread in Golang...
Read MoreToday we'll see how we can use Golang internal functions from syscall and golang.org/x/sys/windows packages to call Windows API. Other languages like C o C++ are specifically
Read MoreThe basename command in Linux is used to extract the last element of a file path. This is particularly helpful in bash scripts where you only need the...
Read MoreBugbounty Resources to get started with bug bounty hunting and security research. Learn about the tools and resources that can help you...
Read MoreCloud computing refers to the delivery of computing services over the internet (the cloud). These services include servers. servers, storage, databases, networking, software
Read MoreServerless computing is a cloud computing model that allows developers to build and run applications without having to manage the...
Read MoreThis post contains Active Directory Pentesting resources to prepare for new OSCP (2022) exam.
Read MoreBashed is a retired HackTheBox machine, rated easy and rightfully. We'll start by finding a hidden web shell to quickly gaining root level access due to misconfigured...
Read MoreThe basename command in Linux is used to extract the last element of a file path. This is particularly helpful in bash scripts where you only need the...
Read More