How to Build a Personal Website with Ghost: No Coding RequiredDiscover Ghost CMS: an open-source tool for creating blogs and websites. Learn what it is and how to install it locally in this guideJan 6Jan 6
Published inInfoSec Write-upsHow To Stabilise a Reverse Shell Using PythonLearn how to upgrade from a dumb shell to a TTY shell during privilege escalationAug 11, 2024Aug 11, 2024
Published inInfoSec Write-upsCyberLens — TryHackMe WriteupA walkthrough for the TryHackMe CyberLens roomMay 20, 2024May 20, 2024
Published inInfoSec Write-upsSpoofing User-Agents: A neat trick to outsmart MicrosoftIt all started when Microsoft wouldn’t let me download Windows (no, really)🪟.Feb 25, 2024Feb 25, 2024
Published inInfoSec Write-upsThe APT Files #2: Putter PandaDiscover the tactics, methods, and stories from another notorious APT in the heart of China: Putter PandaJan 26, 2024Jan 26, 2024
Published inInfoSec Write-upsWhat is a Quantum Insert Attack?Learn the about the fascinating attack the NSA and GHCQ used to allegedly hack Belgacom, one of the biggest telecoms companies in the worldJan 21, 2024Jan 21, 2024
Published inILLUMINATION’S MIRRORThe Binary Betrayal: How Technology Amplifies Financial Fraud TacticsScams and Frauds have been around for a long time. But how have our daily tools have allowed them to go farther?Dec 21, 20231Dec 21, 20231
Published inInfoSec Write-upsThe APT Files: APT1 — Comment CrewIn this month’s release of the APT files, find out about the very first categorised Advanced Persistent Threat: The Comment CrewDec 19, 2023Dec 19, 2023
Published inSystem WeaknessBlaster — TryHackMe WriteupA walkthrough for the Blaster room by TryHackMeDec 16, 2023Dec 16, 2023
Operation ‘Duck Hunt’ brings down QuackbotYeah, you read the title correctly. The FBI and International Law Enforcement have brought down the infamous QauckbotSep 8, 2023Sep 8, 2023