Open in app

Sign In

Write

Sign In

SCR1P7K1DD13
SCR1P7K1DD13

5 Followers

Home

About

Aug 10, 2021

The Missing Bits: Part 3

Buckle up, things are about to get serious now. Consider this as a real-world CTF where the machine is intentionally made vulnerable. Similarly, we will make a vulnerable C program and compile it by disabling all stack protection mechanisms. …

Cybersecurity

6 min read

The Missing Bits: Part 3
The Missing Bits: Part 3
Cybersecurity

6 min read


Aug 10, 2021

The Missing Bits: Part 2

We now know the basics but that's not enough we’ve to dig a little deeper. Data is being pushed and popped out of the stack as a program executes. But have you ever wondered how the system keeps track of this execution? That’s when registers come into play. Registers are…

Cybersecurity

3 min read

The Missing Bits: Part 2
The Missing Bits: Part 2
Cybersecurity

3 min read


Aug 10, 2021

The Missing Bits: Part 1

I remember my college days, the good old days. The time we spend with friends. The most troublesome part of it was the exam. when I try to remember the answer to a question all I can remember was English songs. I never questioned that behavior, maybe because I love…

Cybersecurity

3 min read

The Missing Bits: Part 1
The Missing Bits: Part 1
Cybersecurity

3 min read


Apr 29, 2021

The Silent Shell

We live in a world where everything is connected through the internet. Something that is considered as a blessing and a curse at the same time. Almost everyone from developers to students uses the internet every day, but they are not the only ones using the internet, some people use…

Macro

8 min read

The Silent Shell
The Silent Shell
Macro

8 min read


Apr 8, 2021

The art of stealing passwords

The world is going passwordless. Meaning no more memorized secrets instead they make use of “possession factors”, like OTP or software-based authenticators(Authy, Google authenticator). The password-based authentication is coming to an end and adopting new changes will always benefit the security culture. But will it really end? No, because…

Awareness

4 min read

The art of stealing passwords
The art of stealing passwords
Awareness

4 min read


Mar 11, 2021

Hide & Seek

We all love playing Hide & Seek. A game we enjoyed playing in our childhood. The rules were so simple, one person would close their eyes and start counting (often counted as 50) while other players would hide. The seeker then opens his eyes and tries to find the hiders…

Dns Tunneling

5 min read

Hide & Seek
Hide & Seek
Dns Tunneling

5 min read


Mar 3, 2021

The Cute Cat

The world is changing so does technology. We can see a change of ten years in just one year. The technology is changing so rapidly that even recruiters don’t know how to recruit to a new post. But, are we making use of up-to-date configurations…

Cybersecurity

5 min read

The Cute Cat
The Cute Cat
Cybersecurity

5 min read


Feb 26, 2021

Subdomain Enumeration: Build your own tool

Hello security enthusiasts welcome to yet another blog. In this blog, we will learn how to create a simple subdomain enumeration tool with python. Subdomain enumeration is a critical step in recon since understanding digital assets play a major role in every pentest activity. For the same, we have a…

Cybersecurity

6 min read

Subdomain Enumeration: Build your own tool
Subdomain Enumeration: Build your own tool
Cybersecurity

6 min read


Feb 23, 2021

The Time Eater

Automating the manual workflow is a great task. This allows us to reduce the time it takes to perform tasks that may take a long time to complete. In penetration testing also we have a wide variety of tools to serve various purposes. For example, let’s consider Recon. If you…

Shellscripting

6 min read

The Time Eater
The Time Eater
Shellscripting

6 min read


Feb 17, 2021

The hidden treasure

JK Gyllenhaal’s Source Code is one of my favorite movies, but we’re not going to talk about it here. This is not a movie review, but let’s see how to extract source code from compiled Android apps. Let’s first understand what APK is. An Android Package Kit (APK for short)…

Android Pentesting

3 min read

The hidden treasure
The hidden treasure
Android Pentesting

3 min read

SCR1P7K1DD13

SCR1P7K1DD13

5 Followers

Just another curious person ⚡️. Find me at linkedin.com/in/pranav-k-12b121170.

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech