Managing Identity and Access in the Cloud: Best Practices for Security ⌘ Read more
Soccer — HTB Walkthrough ⌘ Read more
Process Injection Series Part I: PE Injection ⌘ Read more
TryHackMe: Digital Forensics Case B4DM755 ⌘ Read more
Capture Login Information from the Captive Portal with SEToolkit ⌘ Read more
A Day of Bounty Bonanza: Discovering Two Bugs Back-to-Back! ⌘ Read more
How To Get Your First Job as a Hacker (Important Tips!) ⌘ Read more
Linux Forensic: A Practical Approach for Uncovering Digital Evidence ⌘ Read more
Unlocking Threat Visibility: IOC Management for Enhanced Cybersecurity ⌘ Read more
PowerShell: Ignite Your Digital Domain with Command-Line Brilliance ! ⌘ Read more
Hacking WhatsApp with tiny little hardware | Unveiling the Mac OS Security Myth: Exploiting… ⌘ Read more
Hacking Top Website accounts | Poseidon: Empowering Phishing with a Cloud-Based Social Engineering… ⌘ Read more
The Art of G-mail Hacking! → Secrets of Impersonation! ⌘ Read more
Lock & Load: Arming Yourself with Custom Sigma Rules
Learn how to use Sigma rules to translate threat intelligence into threat hunting!
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/lock-load-arming-yourself-with-custom-sigm … ⌘ Read more
Malware Analysis Lab Environment
Setting up a malware analysis lab environment using Proxmox, REMnux, and Flare-VM
Threat Hunting II: Environment Setup
Welcome back to part II of this series on threat hunting! (apologies for the delay).
Cyber Security Assessments — The value for the Business and the Techies
Part of the improvement process — regardless of if it’s personal or an organizational process — requires retrospection and inspection of…
[Continue … ⌘ Read more
Decoding Log4j : What You Need to Know ⌘ Read more
Critical Finding on TP-Link service or how I got 0$ ⌘ Read more
SQL injection with INSERT statement ⌘ Read more
Turning My Manual Methodology to a Cloud-Based GUI Tool for Web Recon | Ghost Recon Your Ultimate… ⌘ Read more
TryHackMe: CC ~ Pen Testing ⌘ Read more
Linux Strength Training ~ THM Write Up ⌘ Read more
Hacking CSRF: Bypassing of CSRF token ⌘ Read more
Learn How Hackers hack Databases (PART 2) ⌘ Read more
Learn How hackers hack Databases (PART 1) ⌘ Read more
Hack Someone’s Camera just with a Youtube link ⌘ Read more
LetsDefend Dynamic Malware Analysis Part 2 ⌘ Read more
LetsDefend: Dynamic Malware Analysis Part 1 ⌘ Read more
Send email from anyone to any(user outlook Microsoft) ⌘ Read more
TryHackMe | Valley Writeup ⌘ Read more
LOTL — Why it’s a Hacker Favorite ⌘ Read more
Did you know you can earn bounties using Discord? ⌘ Read more
How Hackers can exploit Caching x Race-Conditions for followers count manipulation on Twitter ⌘ Read more
Building a 30,000$ password cracking rig in the cloud for pennies. ⌘ Read more
Blog Series: Themes You’ll Run Into a Lot in Cyber Security — Validation ⌘ Read more
Weird Improper Access Control Bug of $$$ ⌘ Read more
Simple Bugs — Buying Everything for Free!!! ⌘ Read more
Build Centralized Security Workflows in Github: A tale of Reusable Workflows ⌘ Read more
Hacking Web Apps: Understanding Cross-Site Request Forgery (CSRF) Vulnerabilities
The demonstration in this article showcases a low-security level scenario where a GET request is used to change the admi … ⌘ Read more
Evading Detection with Hoaxshell Obfuscation — A Tool to Bypass Windows Defender
I demonstrate how to generate and obfuscate a PowerShell payload to bypass Windows Defender Antivirus undetected … ⌘ Read more
AllSafe (Intentionally Vulnerable Android Application)- Part 2 ⌘ Read more
On the Fly ARP Spoofing Windows and Linux
In this project, I use a Kali Linux tool called On the Fly to explore how ARP spoofing works on a Windows and Linux machine.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/on-the-fly-arp-spoofing-windo … ⌘ Read more
Python Penetration Testing: This Team Must be Token ⌘ Read more
XSS Intigriti challenge ⌘ Read more
BUG BOUNTY HUNTING (METHODOLOGY , TOOLS , TIPS & TRICKS , Blogs, Books) ⌘ Read more
Multiple CVEs affecting Pydio Cells 4.2.0
Greetings hackers; just quickly wanted to share an advisory write-up that my team discovered in Pydio Cells 4.2.0. These have been…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/multiple-cves-affectin … ⌘ Read more
Unmasking Basic CSRF Bugs: Hunter Guide for Beginners ⌘ Read more
How does Artificial Intelligence change bug bounty? ⌘ Read more