Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Welcome to Our Blog

Explore the latest articles and insights from our team

Complete Wifi Hacking Course 2024
11/14/2024
·
Waseem Akram

Complete Wifi Hacking Course 2024

This course is designed to be hands-on and beginner-friendly, so even if you’re new to the world of network security, you’ll be able to follow along with ease. By the end, you'll have a

Read More
Malware Development 5 - Malware analysis evasion via Api Hashing (Golang)
11/8/2024
·
Waseem Akram

Malware Development 5 - Malware analysis evasion via Api Hashing (Golang)

Today we’re going to see how real malware protect themselves from being analyzed using a technique called Api Hashing. First of all we should...

Read More
Malware Development 4 - Dump lsass.exe process + AV/EDR evasion (Golang)
10/17/2024
·
Waseem Akram

Malware Development 4 - Dump lsass.exe process + AV/EDR evasion (Golang)

Today we’ll dump LSASS.EXE process memory to obtain credentials and we also will be using some evasion techniques. During red team...

Read More
Malware Development 3 - Persistence via Recycle Bin (Golang)
10/15/2024
·
Waseem Akram

Malware Development 3 - Persistence via Recycle Bin (Golang)

Today we’re gonna see an effective technique to mantain access in Windows systems during red team operations just by modifying a registry key...

Read More
Malware Development 2 UuidFromString shellcode injection (Golang)
10/14/2024
·
Waseem Akram

Malware Development 2 UuidFromString shellcode injection (Golang)

Today we’ll learn an advanced shellcode injection technique used by Lazarus group which uses UuidFromStringA API call. In this technique, the malware..

Read More
How Hackers Target Instagram Accounts & How to Protect Yourself in 2024
10/5/2024
·
Waseem Akram

How Hackers Target Instagram Accounts & How to Protect Yourself in 2024

Instahack is a security tool officially designed to test the password strength of Instagram accounts using termux and kali with a brute force attack...

Read More
Malware Development 1 - CreateRemoteThread shellcode injection (Golang)
10/1/2024
·
Waseem Akram

Malware Development 1 - CreateRemoteThread shellcode injection (Golang)

Today we’re gonna see a simple malware development technique, Shellcode injection via CreateRemoteThread in Golang...

Read More
Malware Development How to call Windows API from Go
9/30/2024
·
Waseem Akram

Malware Development How to call Windows API from Go

Today we'll see how we can use Golang internal functions from syscall and golang.org/x/sys/windows packages to call Windows API. Other languages like C o C++ are specifically

Read More
Understanding the basename Command in Linux
9/28/2024
·
Waseem Akram

Understanding the basename Command in Linux

The basename command in Linux is used to extract the last element of a file path. This is particularly helpful in bash scripts where you only need the...

Read More
Bugbounty Resources and Tools
3/1/2024
·
Waseem Akram

Bugbounty Resources and Tools

Bugbounty Resources to get started with bug bounty hunting and security research. Learn about the tools and resources that can help you...

Read More
What is Cloud Computing
3/1/2024
·
Waseem Akram

What is Cloud Computing

Cloud computing refers to the delivery of computing services over the internet (the cloud). These services include servers. servers, storage, databases, networking, software

Read More
Exploring the Potential of Serverless Computing
3/1/2023
·
Michael Johnson

Exploring the Potential of Serverless Computing

Serverless computing is a cloud computing model that allows developers to build and run applications without having to manage the...

Read More
Active Directory Pentesting resources 📚
1/9/2022
·
Waseem Akram

Active Directory Pentesting resources 📚

This post contains Active Directory Pentesting resources to prepare for new OSCP (2022) exam.

Read More
Boom Bashed 🧨💥
7/16/2021
·
Waseem Akram

Boom Bashed 🧨💥

Bashed is a retired HackTheBox machine, rated easy and rightfully. We'll start by finding a hidden web shell to quickly gaining root level access due to misconfigured...

Read More
Steganography for Beginners - Data Hiding Techniques 🔏
2/7/2019
·
Waseem Akram

Steganography for Beginners - Data Hiding Techniques 🔏

The basename command in Linux is used to extract the last element of a file path. This is particularly helpful in bash scripts where you only need the...

Read More