SCR1P7K1DD13The Missing Bits: Part 3Buckle up, things are about to get serious now. Consider this as a real-world CTF where the machine is intentionally made vulnerable…6 min read·Aug 10, 2021----
SCR1P7K1DD13The Missing Bits: Part 2We now know the basics but that's not enough we’ve to dig a little deeper. Data is being pushed and popped out of the stack as a program…3 min read·Aug 10, 2021----
SCR1P7K1DD13The Missing Bits: Part 1I remember my college days, the good old days. The time we spend with friends. The most troublesome part of it was the exam. when I try to…3 min read·Aug 10, 2021----
SCR1P7K1DD13The Silent ShellWe live in a world where everything is connected through the internet. Something that is considered as a blessing and a curse at the same…8 min read·Apr 29, 2021----
SCR1P7K1DD13The art of stealing passwordsThe world is going passwordless. Meaning no more memorized secrets instead they make use of “possession factors”, like OTP or…4 min read·Apr 8, 2021----
SCR1P7K1DD13Hide & SeekWe all love playing Hide & Seek. A game we enjoyed playing in our childhood. The rules were so simple, one person would close their eyes…5 min read·Mar 11, 2021----
SCR1P7K1DD13The Cute CatThe world is changing so does technology. We can see a change of ten years in just one year. The technology is changing so rapidly that…5 min read·Mar 3, 2021----
SCR1P7K1DD13Subdomain Enumeration: Build your own toolHello security enthusiasts welcome to yet another blog. In this blog, we will learn how to create a simple subdomain enumeration tool with…6 min read·Feb 26, 2021--1--1
SCR1P7K1DD13The Time EaterAutomating the manual workflow is a great task. This allows us to reduce the time it takes to perform tasks that may take a long time to…6 min read·Feb 23, 2021----
SCR1P7K1DD13The hidden treasureJK Gyllenhaal’s Source Code is one of my favorite movies, but we’re not going to talk about it here. This is not a movie review, but let’s…3 min read·Feb 17, 2021----