PinnedPublished inInfoSec Write-upsUse these cheatsheets to increase your CTF speed.This cheatsheet contains essential commands I always use in CTFs, THM boxes, and in cybersecurity. Includes commands and tools for…Nov 13, 20235Nov 13, 20235
PinnedPublished inOSINT TeamOverTheWire —Ultimate Bandit WalkthroughToday, we will play a war-game called Bandit. It has a collection of 34 levels. OverTheWire Organization hosts this war-game. Absolute…Nov 23, 2023Nov 23, 2023
PinnedPython in a Nutshell! 🙃(Part-1)This article teaches you the basics of python in very less time. If you are a college student or a programmer or a hacker who want to…Aug 21, 2022Aug 21, 2022
PinnedPublished inInfoSec Write-upsC Language for Hackers & Beyond! 0x01Hello Tenderfoot hackers, welcome you to the world of hacking. You came here because you don’t want to be a script kiddie in this…May 7, 20221May 7, 20221
Published inInfoSec Write-upsTryHackMe : Text4shell WriteupHello Hackers! Dive Deep into the TXT4Shell TryHackMe Room: An Exclusive Walkthrough of My Custom CTF ChallengeSep 3Sep 3
Published inInfoSec Write-upsBoost Your Bug Bounty Game: Get Started with Free VPS on Krutrim CloudIntroductionAug 172Aug 172
Published inCoinmonksExploring Blockchain Technology: Decentralized Ledger Systems Revolutionizing Data ManagementHello everyone,Jun 22Jun 22
Published inInfoSec Write-upsEscalation of Windows Privilege: Kernel Exploit.Table of ContentFeb 24Feb 24
An Extensive Look at Kerberoasting AttackIn this article, we will talk about kerberoasting attacks and other various forms of Kerberos authentication abuse . However, prior to…Dec 26, 20231Dec 26, 20231
Published inSystem WeaknessWhat is this httpx thing? Using it in your adventure with Bugbounty?IntroductionDec 1, 2023Dec 1, 2023