The Missing Bits: Part 3Buckle up, things are about to get serious now. Consider this as a real-world CTF where the machine is intentionally made vulnerable…Aug 10, 2021Aug 10, 2021
The Missing Bits: Part 2We now know the basics but that's not enough we’ve to dig a little deeper. Data is being pushed and popped out of the stack as a program…Aug 10, 2021Aug 10, 2021
The Missing Bits: Part 1I remember my college days, the good old days. The time we spend with friends. The most troublesome part of it was the exam. when I try to…Aug 10, 2021Aug 10, 2021
The Silent ShellWe live in a world where everything is connected through the internet. Something that is considered as a blessing and a curse at the same…Apr 29, 2021Apr 29, 2021
The art of stealing passwordsThe world is going passwordless. Meaning no more memorized secrets instead they make use of “possession factors”, like OTP or…Apr 8, 2021Apr 8, 2021
Hide & SeekWe all love playing Hide & Seek. A game we enjoyed playing in our childhood. The rules were so simple, one person would close their eyes…Mar 11, 2021Mar 11, 2021
The Cute CatThe world is changing so does technology. We can see a change of ten years in just one year. The technology is changing so rapidly that…Mar 3, 2021Mar 3, 2021
Subdomain Enumeration: Build your own toolHello security enthusiasts welcome to yet another blog. In this blog, we will learn how to create a simple subdomain enumeration tool with…Feb 26, 20211Feb 26, 20211
The Time EaterAutomating the manual workflow is a great task. This allows us to reduce the time it takes to perform tasks that may take a long time to…Feb 23, 2021Feb 23, 2021
The hidden treasureJK Gyllenhaal’s Source Code is one of my favorite movies, but we’re not going to talk about it here. This is not a movie review, but let’s…Feb 17, 2021Feb 17, 2021